CVE-2025-62225

6.7 MEDIUM

📋 TL;DR

Sony Optical Disc Archive Software registers a Windows service with an unquoted file path, allowing local attackers with write permissions on the system drive root directory to escalate privileges to SYSTEM by placing malicious executables in path gaps. This affects Windows systems running the vulnerable software.

💻 Affected Systems

Products:
  • Sony Optical Disc Archive Software
Versions: All versions prior to the fix
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Windows OS and the vulnerable software installed. Exploitation requires write permission to the root directory of the system drive (typically C:\) which may be restricted by default in some environments.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full SYSTEM privilege compromise leading to complete host takeover, data theft, and lateral movement capabilities.

🟠

Likely Case

Privilege escalation from a standard user to SYSTEM on affected workstations or servers.

🟢

If Mitigated

Limited impact if proper file permissions restrict write access to system drive root directory.

🌐 Internet-Facing: LOW - Requires local access to the system.
🏢 Internal Only: MEDIUM - Internal attackers with standard user access could exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and write permissions to system drive root. The vulnerability pattern (unquoted service paths) is well-known and easily exploitable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version as specified in Sony advisory

Vendor Advisory: https://www.sony.jp/oda/application/?srsltid=AfmBOoo8t7k-alQo7ZnV2MAhq8qfIJtFOJN41U2Tu-B1yrpx3Y_KHurk

Restart Required: Yes

Instructions:

1. Download the latest version from Sony's Optical Disc Archive Software page. 2. Install the update following vendor instructions. 3. Restart the system to ensure service changes take effect.

🔧 Temporary Workarounds

Add quotes to service path

windows

Manually add quotes around the service executable path in Windows Registry

sc config "ServiceName" binPath= "\"C:\Program Files\Sony\ODA Software\oda.exe\""
Restart the service after making changes

Restrict write permissions to system drive root

windows

Remove write permissions for standard users on the root directory of the system drive

icacls C:\ /deny Users:(OI)(CI)W
icacls C:\ /deny Authenticated Users:(OI)(CI)W

🧯 If You Can't Patch

  • Restrict write permissions for standard users on the system drive root directory (C:\) using Windows permissions or Group Policy.
  • Monitor for unauthorized file creation in system drive root and suspicious service execution events.

🔍 How to Verify

Check if Vulnerable:

Check if Sony Optical Disc Archive Software is installed and examine service paths in Registry (HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services) for unquoted paths containing spaces.

Check Version:

Check software version through Control Panel > Programs and Features or vendor-provided version check utility.

Verify Fix Applied:

Verify service path in Registry has quotes around the full executable path and check software version matches patched version.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: Service Control Manager events (ID 7045) showing service path modifications
  • Security logs: Unauthorized file creation in system drive root directory

Network Indicators:

  • No network indicators - local privilege escalation only

SIEM Query:

EventID=7045 AND (ServiceName contains "Sony" OR ServiceName contains "ODA") OR (EventID=4663 AND ObjectName="C:\\*" AND Accesses="WriteData")

🔗 References

📤 Share & Export