CVE-2025-64699

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers to perform unauthorized raw disk operations due to an incorrect NULL DACL in SevenCs ORCA G2's regService process running with SYSTEM privileges. Attackers could disrupt systems, expose sensitive data, or escalate privileges locally. Only systems running SevenCs ORCA G2 2.0.1.35 with EC2007 Kernel v5.22 are affected.

💻 Affected Systems

Products:
  • SevenCs ORCA G2
Versions: 2.0.1.35
Operating Systems: Windows (EC2007 Kernel v5.22)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the system. The regService process must be running with SYSTEM privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to SYSTEM, complete system compromise, data exfiltration, and persistent backdoor installation.

🟠

Likely Case

Local attackers gaining unauthorized disk access, potentially reading sensitive files or causing system instability through disk manipulation.

🟢

If Mitigated

Limited impact if proper access controls and monitoring are in place, though the vulnerability still exists.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but is straightforward once access is obtained. The GitHub gist provides technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check with SevenCs for security updates. Monitor their security advisories for patch availability.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local user access to systems running vulnerable software to trusted personnel only.

Monitor regService Process

windows

Implement process monitoring for regService to detect unauthorized access attempts.

🧯 If You Can't Patch

  • Isolate affected systems from critical networks and sensitive data.
  • Implement strict access controls and audit all local user activities on vulnerable systems.

🔍 How to Verify

Check if Vulnerable:

Check if SevenCs ORCA G2 version 2.0.1.35 is installed and running with EC2007 Kernel v5.22. Verify regService process is running with SYSTEM privileges.

Check Version:

Check application version through SevenCs ORCA G2 interface or Windows installed programs list.

Verify Fix Applied:

Verify that a patched version from SevenCs is installed and that regService no longer applies NULL DACLs to device objects.

📡 Detection & Monitoring

Log Indicators:

  • Unusual disk access patterns by regService process
  • Failed or successful privilege escalation attempts
  • Access to device objects without proper DACLs

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Process:regService AND (EventID:4656 OR EventID:4663) AND ObjectType:Device

🔗 References

📤 Share & Export