Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61037: n/a

0
High
VulnerabilityCVE-2025-61037cvecve-2025-61037
Published: Wed Dec 31 2025 (12/31/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A local privilege escalation vulnerability exists in SevenCs ORCA G2 2.0.1.35 (EC2007 Kernel v5.22). The flaw is a Time-of-Check Time-of-Use (TOCTOU) race condition in the license management logic. The regService process, which runs with SYSTEM privileges, creates a fixed directory and writes files without verifying whether the path is an NTFS reparse point. By exploiting this race condition, an attacker can replace the target directory with a junction pointing to a user-controlled path. This causes the SYSTEM-level process to drop binaries in a location fully controlled by the attacker, allowing arbitrary code execution with SYSTEM privileges. The vulnerability can be exploited by any standard user with only a single UAC confirmation, making it highly practical and dangerous in real-world environments.

AI-Powered Analysis

AILast updated: 12/31/2025, 16:01:46 UTC

Technical Analysis

CVE-2025-61037 is a local privilege escalation vulnerability identified in SevenCs ORCA G2 version 2.0.1.35, specifically within the EC2007 Kernel v5.22. The vulnerability arises from a Time-of-Check Time-of-Use (TOCTOU) race condition in the license management logic handled by the regService process, which operates with SYSTEM-level privileges. This process creates a fixed directory and writes files without verifying if the target path is an NTFS reparse point (such as a junction). An attacker with standard user privileges can exploit this by quickly replacing the intended directory with a junction pointing to a path they control. Consequently, the SYSTEM-privileged process writes binaries into locations controlled by the attacker, enabling arbitrary code execution at SYSTEM privilege level. Exploitation requires only a single User Account Control (UAC) confirmation, making it feasible in many real-world environments where users may accept prompts without suspicion. The vulnerability does not require network access and is local to the machine, but the impact is severe due to the privilege escalation to SYSTEM. No CVSS score has been assigned yet, and no public exploits are currently known. The vulnerability highlights a critical flaw in handling NTFS reparse points and race conditions in privileged processes, emphasizing the need for secure path validation and atomic operations in security-sensitive code.

Potential Impact

For European organizations, the impact of CVE-2025-61037 can be significant, especially in sectors relying on SevenCs ORCA G2 software, such as maritime navigation, logistics, or other industries using this specialized software. Successful exploitation allows attackers to gain SYSTEM-level privileges from a standard user account, potentially leading to full system compromise, data theft, installation of persistent malware, or lateral movement within enterprise networks. Given the low exploitation barrier (only one UAC prompt), insider threats or malware that can execute with user privileges could leverage this vulnerability to escalate privileges rapidly. This could disrupt critical operations, compromise sensitive data, and damage organizational reputation. The lack of a patch at the time of disclosure increases the urgency for mitigating controls. Additionally, organizations with strict regulatory requirements (e.g., GDPR) may face compliance risks if breaches occur due to this vulnerability.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting standard user permissions to prevent unauthorized creation or modification of NTFS junction points in directories used by regService. 2. Implement monitoring and alerting for suspicious creation or modification of NTFS reparse points and unusual file writes by the regService process. 3. Enforce strict UAC policies and user training to reduce the likelihood of users approving unexpected elevation prompts. 4. Apply application whitelisting to prevent unauthorized binaries from executing, especially in directories writable by SYSTEM processes. 5. Network segmentation and endpoint detection and response (EDR) solutions can help detect and contain exploitation attempts. 6. Coordinate with SevenCs for timely patch deployment once available, and test patches in controlled environments before production rollout. 7. Consider temporary disabling or restricting the regService process if feasible without disrupting critical operations. 8. Conduct regular security audits focusing on privilege escalation vectors and race condition vulnerabilities in critical software components.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695544badb813ff03ef0a097

Added to database: 12/31/2025, 3:43:54 PM

Last enriched: 12/31/2025, 4:01:46 PM

Last updated: 1/7/2026, 4:12:44 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats