Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10639: CWE-798 Use of Hard-coded Credentials in EfficientLab WorkExaminer Professional

0
High
VulnerabilityCVE-2025-10639cvecve-2025-10639cwe-798
Published: Tue Oct 21 2025 (10/21/2025, 11:36:10 UTC)
Source: CVE Database V5
Vendor/Project: EfficientLab
Product: WorkExaminer Professional

Description

The WorkExaminer Professional server installation comes with an FTP server that is used to receive the client logs on TCP port 12304. An attacker with network access to this port can use weak hardcoded credentials to login to the FTP server and modify or read data, log files and gain remote code execution as NT Authority\SYSTEM on the server by exchanging accessible service binaries in the WorkExaminer installation directory (e.g. "C:\Program File (x86)\Work Examiner Professional Server").

AI-Powered Analysis

AILast updated: 11/04/2025, 12:33:57 UTC

Technical Analysis

CVE-2025-10639 is a critical vulnerability affecting EfficientLab's WorkExaminer Professional server installations up to version 4.0.0.52001. The product includes an embedded FTP server listening on TCP port 12304, designed to receive client logs. This FTP server uses hardcoded, weak credentials (CWE-798), which an attacker with network access can exploit to authenticate without authorization. Once authenticated, the attacker can read and modify sensitive log files and, more critically, replace service binaries located in the WorkExaminer installation directory (e.g., "C:\Program File (x86)\Work Examiner Professional Server"). By swapping these binaries, the attacker can execute arbitrary code remotely with NT Authority\SYSTEM privileges, effectively gaining full control over the server. The vulnerability requires network access to the FTP port but no user interaction, and privileges needed are low since authentication is bypassed via hardcoded credentials. The CVSS 3.1 score of 8.8 reflects the ease of exploitation (low attack complexity), no user interaction, and the severe impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the potential for full system compromise. The root cause is the insecure design choice of embedding hardcoded credentials in a network-facing service, violating secure credential management best practices.

Potential Impact

For European organizations, this vulnerability presents a severe risk, especially for those using WorkExaminer Professional for employee monitoring and productivity tracking. Successful exploitation allows attackers to gain SYSTEM-level access, leading to complete compromise of the affected server. This can result in unauthorized access to sensitive employee data, tampering with logs that could be used for auditing or compliance, and potential lateral movement within the corporate network. The ability to execute arbitrary code with high privileges can also facilitate deployment of ransomware, espionage tools, or persistent backdoors. Given the criticality of the access level and the potential to disrupt business operations, organizations face risks to confidentiality, integrity, and availability of their IT systems. Additionally, compromised monitoring systems may undermine trust and violate privacy regulations such as GDPR, leading to legal and reputational damage.

Mitigation Recommendations

Organizations should immediately identify any WorkExaminer Professional servers running versions up to 4.0.0.52001 and assess exposure of TCP port 12304. Network segmentation and firewall rules should be applied to restrict access to this port only to trusted internal hosts. If possible, disable the embedded FTP server or replace it with a secure alternative that does not use hardcoded credentials. EfficientLab should be contacted for patches or updates that remove hardcoded credentials; if no patch is available, consider upgrading to a newer version or alternative products. Monitoring and alerting on unexpected FTP connections and file changes in the WorkExaminer installation directory can help detect exploitation attempts. Employing application whitelisting and integrity monitoring on the server can prevent unauthorized binary modifications. Finally, conduct regular audits of user access and network configurations to reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SEC-VLab
Date Reserved
2025-09-17T14:05:15.138Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f77387a08cdec9506874f4

Added to database: 10/21/2025, 11:50:31 AM

Last enriched: 11/4/2025, 12:33:57 PM

Last updated: 12/7/2025, 2:44:33 PM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats