Metrics
Affected Vendors & Products
No advisories yet.
Solution
The vendor responded to the submission of our security vulnerabilities by stating that they are not within the scope of their bug bounty program. After telling them that we do not care about the bug bounty but a fix for the issues, we did not receive any further response. Hence, there is no fix available for the identified security issues and we assume that this product is unmaintained. We urge customers to contact EfficientLab regarding the issues and a potential solution, such as using another product.
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://r.sec-consult.com/workexaminer |
![]() ![]() |
Tue, 21 Oct 2025 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | All WorkExaminer Professional traffic between monitoring client, console and server is transmitted as plain text. This allows an attacker with access to the network to read the transmitted sensitive data. An attacker can also freely modify the data on the wire. The monitoring clients transmit their data to the server using the unencrypted FTP. Clients connect to the FTP server on port 12304 and transmit the data unencrypted. In addition, all traffic between the console client and the server at port 12306 is unencrypted. | |
Title | Unencrypted cleartext communication in EfficientLab WorkExaminer Professional | |
Weaknesses | CWE-319 | |
References |
|

Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-10-21T11:48:02.692Z
Reserved: 2025-09-17T14:05:17.784Z
Link: CVE-2025-10641

No data.

Status : Awaiting Analysis
Published: 2025-10-21T12:15:35.543
Modified: 2025-10-21T19:31:25.450
Link: CVE-2025-10641

No data.

No data.