CVE-2025-61303

9.8 CRITICAL

📋 TL;DR

This vulnerability in Hatching Triage Sandbox allows malware samples to evade detection by recursively spawning child processes to exhaust system resources. This causes denial-of-analysis, preventing recording of malicious activities like PowerShell execution and reverse shells. Security analysts using affected sandbox versions are impacted as analysis results become unreliable.

💻 Affected Systems

Products:
  • Hatching Triage Sandbox
Versions: Windows 10 build 2004 (2025-08-14) and Windows 10 LTSC 2021 (2025-08-14)
Operating Systems: Windows 10
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects specific Windows 10 builds of the sandbox from the specified date. Other OS versions and earlier builds may not be vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malware completely evades sandbox detection, leading to false negatives that allow malicious samples to enter production environments undetected, potentially causing widespread compromise.

🟠

Likely Case

Malware samples successfully bypass behavioral analysis in the sandbox, resulting in incomplete or misleading threat reports that could lead to security incidents.

🟢

If Mitigated

With proper monitoring and resource limits, the impact is reduced to temporary analysis delays and incomplete reports for specific samples.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires submitting a specially crafted malware sample to the sandbox. The GitHub reference contains technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

Check Hatching's official channels for security updates. As of now, no official patch has been released according to available information.

🔧 Temporary Workarounds

Implement process limits

windows

Configure system resource limits to prevent process exhaustion attacks

# Use Windows Group Policy or system configuration to limit process creation
# Example: Set Job Object limits for sandbox processes

Monitor resource usage

windows

Implement monitoring for abnormal process spawning and resource consumption

# Use Windows Performance Monitor or custom scripts
# Example: Monitor Process Count and CPU/Memory usage

🧯 If You Can't Patch

  • Isolate sandbox environment from production networks
  • Implement additional malware analysis layers beyond behavioral analysis

🔍 How to Verify

Check if Vulnerable:

Check if running Hatching Triage Sandbox Windows 10 build 2004 (2025-08-14) or Windows 10 LTSC 2021 (2025-08-14)

Check Version:

Check sandbox version information in Hatching Triage interface or configuration files

Verify Fix Applied:

Test with sample that recursively spawns processes and verify behavioral analysis captures all activities

📡 Detection & Monitoring

Log Indicators:

  • Unusually high process creation rates
  • Resource exhaustion warnings
  • Missing PowerShell/reverse shell logs in sandbox reports

Network Indicators:

  • None specific - this is a sandbox evasion technique

SIEM Query:

Process creation count > threshold AND parent_process contains 'sandbox' OR resource_usage > 90%

🔗 References

📤 Share & Export