Anthropic Sandbox Runtime is a lightweight sandboxing tool for enforcing filesystem and network restrictions on arbitrary processes at the OS level, without requiring a container. Prior to 0.0.16, due to a bug in sandboxing logic, sandbox-runtime did not properly enforce a network sandbox if the sandbox policy did not configure any allowed domains. This could allow sandboxed code to make network requests outside of the sandbox. A patch for this was released in v0.0.16.
History

Fri, 05 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 05 Dec 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Anthropic
Anthropic sandbox-runtime
Vendors & Products Anthropic
Anthropic sandbox-runtime

Thu, 04 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
Description Anthropic Sandbox Runtime is a lightweight sandboxing tool for enforcing filesystem and network restrictions on arbitrary processes at the OS level, without requiring a container. Prior to 0.0.16, due to a bug in sandboxing logic, sandbox-runtime did not properly enforce a network sandbox if the sandbox policy did not configure any allowed domains. This could allow sandboxed code to make network requests outside of the sandbox. A patch for this was released in v0.0.16.
Title Anthropic Sandbox Runtime Incorrectly Implemented Network Sandboxing
Weaknesses CWE-693
References
Metrics cvssV4_0

{'score': 1.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-12-04T20:57:20.631Z

Updated: 2025-12-05T17:04:34.471Z

Reserved: 2025-12-02T17:09:52.016Z

Link: CVE-2025-66479

cve-icon Vulnrichment

Updated: 2025-12-05T17:04:31.562Z

cve-icon NVD

Status : Received

Published: 2025-12-04T21:16:09.393

Modified: 2025-12-04T21:16:09.393

Link: CVE-2025-66479

cve-icon Redhat

No data.