Impact
Sandboxie-Plus includes an UpdUtil add‑on installer that runs as SYSTEM. The installer performs a TOCTOU check: it verifies hashes of a cabinet file, then extracts and runs executables from that cabinet. An attacker can replace the cabinet with a crafted file between the hash verification and extraction, causing a malicious executable to run with SYSTEM privileges. The flaw therefore allows a local user to gain SYSTEM rights without triggering User‑Account Control.
Affected Systems
The vulnerability is present in Sandboxie‑Plus 1.17.2 and all earlier releases. Users running those versions on Windows are exposed. The issue was addressed in version 1.17.3, which contains a fixed installation routine that prevents the race.
Risk and Exploitability
The CVSS score of 5.4 classifies the risk as medium severity. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog, indicating no known widespread exploitation. The likely attack vector requires an authenticated local user capable of installing an add‑on via the SandMan interface. Because the race occurs before UAC prompts, the exploit can be executed silently.
OpenCVE Enrichment