A local privilege escalation vulnerability exists in SevenCs ORCA G2 2.0.1.35 (EC2007 Kernel v5.22). The flaw is a Time-of-Check Time-of-Use (TOCTOU) race condition in the license management logic. The regService process, which runs with SYSTEM privileges, creates a fixed directory and writes files without verifying whether the path is an NTFS reparse point. By exploiting this race condition, an attacker can replace the target directory with a junction pointing to a user-controlled path. This causes the SYSTEM-level process to drop binaries in a location fully controlled by the attacker, allowing arbitrary code execution with SYSTEM privileges. The vulnerability can be exploited by any standard user with only a single UAC confirmation, making it highly practical and dangerous in real-world environments.

Project Subscriptions

Vendors Products
Sevencs Subscribe
Ec2007 Kernel Subscribe
Orca G2 Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 14 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Sevencs
Sevencs ec2007 Kernel
Sevencs orca G2
CPEs cpe:2.3:a:sevencs:ec2007_kernel:5.22:*:*:*:*:*:*:*
cpe:2.3:a:sevencs:orca_g2:2.0.1.35:*:*:*:*:*:*:*
Vendors & Products Sevencs
Sevencs ec2007 Kernel
Sevencs orca G2

Fri, 02 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-367
Metrics cvssV3_1

{'score': 7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 31 Dec 2025 15:45:00 +0000

Type Values Removed Values Added
Description A local privilege escalation vulnerability exists in SevenCs ORCA G2 2.0.1.35 (EC2007 Kernel v5.22). The flaw is a Time-of-Check Time-of-Use (TOCTOU) race condition in the license management logic. The regService process, which runs with SYSTEM privileges, creates a fixed directory and writes files without verifying whether the path is an NTFS reparse point. By exploiting this race condition, an attacker can replace the target directory with a junction pointing to a user-controlled path. This causes the SYSTEM-level process to drop binaries in a location fully controlled by the attacker, allowing arbitrary code execution with SYSTEM privileges. The vulnerability can be exploited by any standard user with only a single UAC confirmation, making it highly practical and dangerous in real-world environments.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-01-02T18:05:57.530Z

Reserved: 2025-09-26T00:00:00.000Z

Link: CVE-2025-61037

cve-icon Vulnrichment

Updated: 2026-01-02T15:59:29.494Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-31T16:15:43.727

Modified: 2026-01-14T20:29:48.850

Link: CVE-2025-61037

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses