Vulnerability Description
Sandboxie-Plus is an open source sandbox-based isolation software for Windows. In versions 1.17.2 and earlier, SbieIniServer::HashPassword converts a SHA-1 digest to hexadecimal incorrectly. The high nibble of each byte is shifted right by 8 instead of 4, which always produces zero for an 8-bit value. As a result, the stored EditPassword hash only preserves the low nibble of each digest byte, reducing the effective entropy from 160 bits to 80 bits. This is layered on top of an unsalted SHA-1 scheme. The reduced entropy makes leaked or backed-up password hashes materially easier to brute-force. This issue has been fixed in version 1.17.3.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sandboxie-Plus | Sandboxie | < 1.17.3 |
Related Weaknesses (CWE)
References
- https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-w37h-qm9p-hMitigationVendor Advisory
- https://github.com/sandboxie-plus/Sandboxie/security/advisories/GHSA-w37h-qm9p-hMitigationVendor Advisory
FAQ
What is CVE-2026-34527?
CVE-2026-34527 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Sandboxie-Plus is an open source sandbox-based isolation software for Windows. In versions 1.17.2 and earlier, SbieIniServer::HashPassword converts a SHA-1 digest to hexadecimal incorrectly. The high ...
How severe is CVE-2026-34527?
CVE-2026-34527 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-34527?
Check the references section above for vendor advisories and patch information. Affected products include: Sandboxie-Plus Sandboxie.