We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-46715

Sandboxie Arbitrary Kernel Write in SbieDrv.sys API (API_GET_SECURE_PARAM)



Description

Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. Starting in version 1.3.0 and prior to version 1.15.12, Api_GetSecureParam fails to sanitize incoming pointers, and implicitly trusts that the pointer the user has passed in is safe to write to. GetRegValue then writes the contents of the SBIE registry entry selected to this address. An attacker can pass in a kernel pointer and the driver dumps the registry key contents we requested to it. This can be triggered by anyone on the system, including low integrity windows processes. Version 1.15.12 fixes the issue.

Reserved 2025-04-28 | Published 2025-05-22 | Updated 2025-05-22 | Assigner GitHub_M


HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-787: Out-of-bounds Write

Product status

>= 1.3.0, < 1.15.12
affected

References

github.com/...dboxie/security/advisories/GHSA-67p9-6h73-ff7x

cve.org (CVE-2025-46715)

nvd.nist.gov (CVE-2025-46715)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-46715

Support options

Helpdesk Chat, Email, Knowledgebase