The WorkExaminer Professional server installation comes with an FTP server that is used to receive the client logs on TCP port 12304. An attacker with network access to this port can use weak hardcoded credentials to login to the FTP server and modify or read data, log files and gain remote code execution as NT Authority\SYSTEM on the server by exchanging accessible service binaries in the WorkExaminer installation directory (e.g. "C:\Program File (x86)\Work Examiner Professional Server").
Advisories

No advisories yet.

Fixes

Solution

The vendor responded to the submission of our security vulnerabilities by stating that they are not within the scope of their bug bounty program. After telling them that we do not care about the bug bounty but a fix for the issues, we did not receive any further response. Hence, there is no fix available for the identified security issues and we assume that this product is unmaintained. We urge customers to contact EfficientLab regarding the issues and a potential solution, such as using another product.


Workaround

No workaround given by the vendor.

References
History

Tue, 21 Oct 2025 11:45:00 +0000

Type Values Removed Values Added
Description The WorkExaminer Professional server installation comes with an FTP server that is used to receive the client logs on TCP port 12304. An attacker with network access to this port can use weak hardcoded credentials to login to the FTP server and modify or read data, log files and gain remote code execution as NT Authority\SYSTEM on the server by exchanging accessible service binaries in the WorkExaminer installation directory (e.g. "C:\Program File (x86)\Work Examiner Professional Server").
Title Usage of Hardcoded FTP Credentials EfficientLab WorkExaminer Professional
Weaknesses CWE-798
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2025-10-21T11:36:10.097Z

Reserved: 2025-09-17T14:05:15.138Z

Link: CVE-2025-10639

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-21T12:15:34.770

Modified: 2025-10-21T19:31:25.450

Link: CVE-2025-10639

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.