CVE-2025-13164

4.9 MEDIUM

📋 TL;DR

EasyFlow GP software by Digiwin has a vulnerability where insufficient credential protection allows remote attackers with privileged access to obtain plaintext Active Directory and system mail credentials from the frontend. This affects organizations using vulnerable versions of EasyFlow GP for workflow management.

💻 Affected Systems

Products:
  • EasyFlow GP
Versions: Specific versions not detailed in references; all versions before vendor patch are likely affected
Operating Systems: Windows-based deployments (typical for AD integration)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires privileged remote access; affects systems integrated with Active Directory and mail services

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative credentials leading to complete system compromise, data exfiltration, and lateral movement across the network.

🟠

Likely Case

Privileged attackers steal AD credentials to escalate privileges, access sensitive data, and potentially compromise other systems.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to the EasyFlow GP system itself.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires existing privileged access to the system frontend

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in references; check vendor advisory

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-10504-23f4c-2.html

Restart Required: Yes

Instructions:

1. Contact Digiwin for patch details. 2. Apply the security update. 3. Restart EasyFlow GP services. 4. Verify credential protection.

🔧 Temporary Workarounds

Restrict network access

all

Limit remote access to EasyFlow GP frontend to trusted IPs only

Use firewall rules to restrict access to EasyFlow GP ports

Implement credential monitoring

all

Monitor for unusual credential access patterns

Configure SIEM alerts for credential retrieval events

🧯 If You Can't Patch

  • Isolate EasyFlow GP system in a segmented network zone
  • Implement strict access controls and audit all privileged user activities

🔍 How to Verify

Check if Vulnerable:

Check if EasyFlow GP version is unpatched and credentials are stored insecurely in frontend

Check Version:

Check EasyFlow GP administration panel or consult vendor documentation

Verify Fix Applied:

Verify patch installation and test that credentials are no longer accessible in plaintext

📡 Detection & Monitoring

Log Indicators:

  • Unusual credential access patterns from frontend
  • Multiple failed authentication attempts followed by credential retrieval

Network Indicators:

  • Unexpected traffic to/from EasyFlow GP frontend from unauthorized sources

SIEM Query:

source="EasyFlow GP" AND (event="credential_access" OR event="authentication_failure")

🔗 References

📤 Share & Export