CVE-2025-10640

9.8 CRITICAL

📋 TL;DR

CVE-2025-10640 allows unauthenticated attackers to bypass authentication on WorkExaminer Professional servers by exploiting missing server-side validation of database procedure return values. This grants administrative access to sensitive employee monitoring data including screenshots and keystrokes. Organizations using WorkExaminer Professional with exposed TCP port 12306 are affected.

💻 Affected Systems

Products:
  • WorkExaminer Professional
Versions: All versions prior to patch (specific version information not provided in CVE)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the WorkExaminer Professional console server component that listens on TCP port 12306 by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all monitored employee data, potential data exfiltration, installation of additional malware, and complete control over the monitoring infrastructure.

🟠

Likely Case

Unauthorized access to sensitive employee monitoring data including screenshots, keystrokes, and activity logs, potentially leading to privacy violations and corporate espionage.

🟢

If Mitigated

Limited or no impact if proper network segmentation and access controls prevent external access to port 12306.

🌐 Internet-Facing: HIGH - The vulnerability requires only network access to port 12306 and no authentication, making internet-exposed instances extremely vulnerable.
🏢 Internal Only: HIGH - Even internally, any user with network access to port 12306 can exploit this vulnerability without credentials.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only network access to port 12306 and knowledge of the custom protocol. Public disclosure includes technical details that facilitate exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not provided in CVE

Restart Required: No

Instructions:

1. Contact WorkExaminer vendor for patch availability. 2. If patch is available, download and apply according to vendor instructions. 3. Restart WorkExaminer services if required by patch.

🔧 Temporary Workarounds

Network Access Restriction

windows

Block external and unnecessary internal access to TCP port 12306 using firewall rules.

Windows Firewall: netsh advfirewall firewall add rule name="Block WorkExaminer Port" dir=in action=block protocol=TCP localport=12306

Network Segmentation

all

Isolate WorkExaminer servers in a separate network segment with strict access controls.

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to TCP port 12306 only to authorized administrative systems
  • Monitor network traffic to port 12306 for suspicious activity and implement intrusion detection rules

🔍 How to Verify

Check if Vulnerable:

Test if unauthenticated access to TCP port 12306 allows administrative console access. Use network scanning to check port accessibility: nmap -p 12306 <target_ip>

Check Version:

Check WorkExaminer Professional version through administrative console or installed programs list

Verify Fix Applied:

Verify that authentication is properly required for console access and test that unauthenticated access attempts are rejected.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful administrative access
  • Unusual administrative console access from non-standard IP addresses
  • Database procedure calls without preceding authentication events

Network Indicators:

  • TCP connections to port 12346 from unexpected sources
  • Unencrypted protocol traffic on port 12346 matching WorkExaminer patterns
  • Multiple rapid connection attempts to port 12346

SIEM Query:

source_port=12346 AND (event_type="authentication_success" OR event_type="admin_access") AND user="unknown" OR source_ip NOT IN [authorized_admin_ips]

🔗 References

📤 Share & Export