Metrics
Affected Vendors & Products
No advisories yet.
Solution
The vendor responded to the submission of our security vulnerabilities by stating that they are not within the scope of their bug bounty program. After telling them that we do not care about the bug bounty but a fix for the issues, we did not receive any further response. Hence, there is no fix available for the identified security issues and we assume that this product is unmaintained. We urge customers to contact EfficientLab regarding the issues and a potential solution, such as using another product.
Workaround
No workaround given by the vendor.
Mon, 03 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 23 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Efficientlab
Efficientlab workexaminer Professional Microsoft Microsoft windows |
|
| Vendors & Products |
Efficientlab
Efficientlab workexaminer Professional Microsoft Microsoft windows |
Wed, 22 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 21 Oct 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WorkExaminer Professional server installation comes with an FTP server that is used to receive the client logs on TCP port 12304. An attacker with network access to this port can use weak hardcoded credentials to login to the FTP server and modify or read data, log files and gain remote code execution as NT Authority\SYSTEM on the server by exchanging accessible service binaries in the WorkExaminer installation directory (e.g. "C:\Program File (x86)\Work Examiner Professional Server"). | |
| Title | Usage of Hardcoded FTP Credentials EfficientLab WorkExaminer Professional | |
| Weaknesses | CWE-798 | |
| References |
|
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-11-03T17:31:34.424Z
Reserved: 2025-09-17T14:05:15.138Z
Link: CVE-2025-10639
Updated: 2025-11-03T17:31:34.424Z
Status : Awaiting Analysis
Published: 2025-10-21T12:15:34.770
Modified: 2025-11-03T18:15:46.290
Link: CVE-2025-10639
No data.
OpenCVE Enrichment
Updated: 2025-10-23T10:13:04Z