CVE-2025-66479

N/A Unknown

📋 TL;DR

A vulnerability in Anthropic Sandbox Runtime versions before 0.0.16 allows sandboxed processes to bypass network restrictions when the sandbox policy does not specify any allowed domains, enabling unauthorized network requests. This affects users of sandbox-runtime who rely on it to enforce network isolation for arbitrary processes without containerization. The bug is in the sandboxing logic, where missing domain configurations fail to block all network traffic.

💻 Affected Systems

Products:
  • Anthropic Sandbox Runtime
Versions: Versions prior to 0.0.16
Operating Systems: Linux-based systems (as sandbox-runtime is OS-level tool)
Default Config Vulnerable: ✅ No
Notes: Vulnerability only triggers if the sandbox policy does not configure any allowed domains; default or typical configurations may include domain settings, reducing exposure.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sandboxed malicious code could exfiltrate sensitive data, communicate with command-and-control servers, or launch attacks on internal or external networks, compromising system integrity and confidentiality.

🟠

Likely Case

Inadvertent or low-privilege sandboxed processes may access unintended network resources, potentially leading to data leakage or unauthorized actions, though impact depends on the specific sandboxed application.

🟢

If Mitigated

If proper sandbox policies include allowed domains or other network controls, the vulnerability is mitigated, limiting network access as intended.

🌐 Internet-Facing: MEDIUM, as exploitation could allow outbound network requests from internet-facing systems, but requires a vulnerable sandbox configuration and sandboxed code execution.
🏢 Internal Only: MEDIUM, as internal systems using sandbox-runtime with misconfigured policies could be exploited for lateral movement or data exfiltration within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the ability to execute code within a sandboxed process and a misconfigured policy; no authentication bypass is needed beyond that.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.0.16

Vendor Advisory: https://github.com/anthropic-experimental/sandbox-runtime/security/advisories/GHSA-9gqj-5w7c-vx47

Restart Required: Yes

Instructions:

1. Update sandbox-runtime to version 0.0.16 or later using package manager or manual installation. 2. Restart any processes or services using sandbox-runtime to apply the fix. 3. Verify the update with version check commands.

🔧 Temporary Workarounds

Configure allowed domains in sandbox policy

linux

Modify the sandbox policy to include at least one allowed domain, which enforces network restrictions and prevents the bypass.

Edit the sandbox policy file to add 'allowed_domains' configuration, e.g., 'allowed_domains: ["example.com"]'

🧯 If You Can't Patch

  • Ensure all sandbox policies specify allowed domains to enforce network restrictions.
  • Monitor network traffic from sandboxed processes for unauthorized outbound connections and block suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check the sandbox-runtime version; if it is below 0.0.16 and the sandbox policy lacks allowed domains, the system is vulnerable.

Check Version:

sandbox-runtime --version or check package manager output (e.g., dpkg -l sandbox-runtime)

Verify Fix Applied:

After updating to 0.0.16 or later, test sandboxed processes with a policy without allowed domains to confirm network requests are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Logs showing sandboxed processes making unexpected network connections or errors related to sandbox enforcement failures.

Network Indicators:

  • Unusual outbound network traffic from processes expected to be sandboxed, especially to unauthorized domains.

SIEM Query:

Example: search for network events where source process matches sandbox-runtime and destination is not in allowed domains list.

🔗 References

📤 Share & Export