Cyber Posture

CVE-2025-64721

CriticalPublic PoC

Published: 11 December 2025

Published
11 December 2025
Modified
22 December 2025
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0014 33.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. In versions 1.16.6 and below, the SYSTEM-level service SbieSvc.exe exposes SbieIniServer::RC4Crypt to sandboxed processes. The handler adds a fixed header size to a caller-controlled value_len without…

more

overflow checking. A large value_len (e.g., 0xFFFFFFF0) wraps the allocation size, causing a heap overflow when attacker data is copied into the undersized buffer. This allows sandboxed processes to execute arbitrary code as SYSTEM, fully compromising the host. This issue is fixed in version 1.16.7.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely patching of the heap overflow vulnerability in Sandboxie versions 1.16.6 and prior, as fixed in 1.16.7.

prevent

Requires validation of caller-controlled inputs like value_len in SbieSvc.exe to prevent oversized allocations leading to heap overflow.

prevent

Implements memory safeguards such as non-executable heap regions or randomization to mitigate arbitrary code execution from the heap overflow.

Security SummaryAI

CVE-2025-64721 is a heap overflow vulnerability (CWE-190) in Sandboxie, a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. It affects versions 1.16.6 and prior, specifically within the SYSTEM-level service SbieSvc.exe. The issue arises in the SbieIniServer::RC4Crypt handler, which exposes functionality to sandboxed processes and adds a fixed header size to a caller-controlled value_len parameter without overflow checking. A large value_len, such as 0xFFFFFFF0, causes the allocation size to wrap around, resulting in an undersized buffer into which attacker-controlled data is copied, triggering the overflow. The vulnerability carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).

Sandboxed processes can exploit this vulnerability remotely over the network with low complexity and no privileges required. An attacker running malicious code within a Sandboxie-isolated environment can supply a crafted value_len to trigger the heap overflow in SbieSvc.exe, enabling arbitrary code execution with SYSTEM privileges on the host system. This fully compromises the host, bypassing the sandbox isolation entirely.

Sandboxie addresses this issue in version 1.16.7, as detailed in the project's GitHub security advisory (GHSA-w476-j57g-96vp), release notes, and the fixing commit (000492f8c411d24292f1b977a107994347bc7dfa). Security practitioners should update to 1.16.7 or later to mitigate the risk.

Details

CWE(s)

Affected Products

sandboxie-plus
sandboxie
1.14.0 — 1.16.7

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1211 Exploitation for Stealth Stealth
Adversaries may exploit vulnerabilities to evade detection by hiding activity, suppressing logging, or operating within trusted or unmonitored components.
Why these techniques?

Heap overflow in Sandboxie's SYSTEM service (SbieSvc.exe) enables sandboxed processes to execute arbitrary code as SYSTEM, directly mapping to Exploitation for Privilege Escalation (T1068) and Exploitation for Defense Evasion (T1211) by bypassing sandbox isolation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References