Unrated severityNVD Advisory· Published May 22, 2025· Updated May 22, 2025
Sandboxie Arbitrary Kernel Read in SbieDrv.sys API (API_SET_SECURE_PARAM)
CVE-2025-46716
Description
Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. Starting in version 1.3.0 and prior to version 1.15.12, Api_SetSecureParam fails to sanitize incoming pointers, and implicitly trusts that the pointer the user has passed in is safe to read from. SetRegValue then reads an arbitrary address, which can be a kernel pointer, into a HKLM Security SBIE registry value. This can later be retrieved by API_GET_SECURE_PARAM. Version 1.15.12 fixes the issue.
Affected products
1- Range: >= 1.3.0, < 1.15.12
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-3984-r877-q7xpmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.