This issue has been fixed in version 1.17.3.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 06 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sandboxie-plus
Sandboxie-plus sandboxie |
|
| Vendors & Products |
Sandboxie-plus
Sandboxie-plus sandboxie |
Tue, 05 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sandboxie-Plus is an open source sandbox-based isolation software for Windows. In versions 1.17.2 and earlier, SbieIniServer::HashPassword converts a SHA-1 digest to hexadecimal incorrectly. The high nibble of each byte is shifted right by 8 instead of 4, which always produces zero for an 8-bit value. As a result, the stored EditPassword hash only preserves the low nibble of each digest byte, reducing the effective entropy from 160 bits to 80 bits. This is layered on top of an unsalted SHA-1 scheme. The reduced entropy makes leaked or backed-up password hashes materially easier to brute-force. This issue has been fixed in version 1.17.3. | |
| Title | Sandboxie-Plus EditPassword hash entropy reduced from 160 bits to 80 bits due to incorrect nibble extraction | |
| Weaknesses | CWE-328 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-06T12:23:23.349Z
Reserved: 2026-03-30T16:03:31.048Z
Link: CVE-2026-34527
Updated: 2026-05-06T12:23:13.151Z
Status : Awaiting Analysis
Published: 2026-05-05T20:16:37.930
Modified: 2026-05-06T21:24:15.657
Link: CVE-2026-34527
No data.
OpenCVE Enrichment
Updated: 2026-05-05T22:00:12Z