Home

Description

The WorkExaminer Professional server installation comes with an FTP server that is used to receive the client logs on TCP port 12304. An attacker with network access to this port can use weak hardcoded credentials to login to the FTP server and modify or read data, log files and gain remote code execution as NT Authority\SYSTEM on the server by exchanging accessible service binaries in the WorkExaminer installation directory (e.g. "C:\Program File (x86)\Work Examiner Professional Server").

PUBLISHED Reserved 2025-09-17 | Published 2025-10-21 | Updated 2025-10-22 | Assigner SEC-VLab

Problem types

CWE-798 Use of Hard-coded Credentials

Product status

Default status
unknown

<= 4.0.0.52001
affected

Credits

Tobias Niemann, SEC Consult Vulnerability Lab finder

Daniel Hirschberger, SEC Consult Vulnerability Lab finder

Thorger Jansen, SEC Consult Vulnerability Lab finder

Marius Renner, SEC Consult Vulnerability Lab finder

References

r.sec-consult.com/workexaminer third-party-advisory

cve.org (CVE-2025-10639)

nvd.nist.gov (CVE-2025-10639)

Download JSON