CVE-2025-13175

N/A Unknown

📋 TL;DR

This vulnerability allows administrators with UI access to Y Soft SafeQ 6 to reveal Workflow Connector passwords using browser developer tools. Only customers with password-protected scan workflow connectors are affected. The issue exposes sensitive credentials that should remain hidden.

💻 Affected Systems

Products:
  • Y Soft SafeQ 6
Versions: All versions before MU106
Operating Systems: Windows Server (typical deployment)
Default Config Vulnerable: ✅ No
Notes: Only affects customers using password-protected scan workflow connectors. Systems without this feature are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator credentials for workflow connectors are exposed, potentially allowing unauthorized access to connected systems or data exfiltration.

🟠

Likely Case

An administrator accidentally or intentionally reveals connector passwords, compromising the security of connected scanning workflows.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to authorized administrators who already have significant system access.

🌐 Internet-Facing: LOW - This requires authenticated administrator access to the SafeQ UI, which is typically not internet-facing.
🏢 Internal Only: MEDIUM - While requiring admin privileges, it exposes credentials that could be used for lateral movement within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated administrator access to the SafeQ web interface and basic knowledge of browser developer tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: MU106 or later

Vendor Advisory: https://docs.ysoft.cloud/safeq6/latest/safeq6/release-notes-build-106

Restart Required: Yes

Instructions:

1. Download MU106 update from Y Soft support portal. 2. Backup current configuration. 3. Apply the update following vendor instructions. 4. Restart SafeQ services. 5. Verify version shows MU106 or higher.

🔧 Temporary Workarounds

Restrict Administrator Access

all

Limit SafeQ UI access to only trusted administrators who require it for their duties.

Monitor Administrator Activity

all

Implement logging and monitoring of administrator access to SafeQ interface.

🧯 If You Can't Patch

  • Implement strict access controls to limit SafeQ UI access to essential personnel only.
  • Regularly rotate Workflow Connector passwords and monitor for unauthorized access attempts.

🔍 How to Verify

Check if Vulnerable:

Check SafeQ version in administration interface. If version is below MU106 and password-protected scan workflow connectors are configured, the system is vulnerable.

Check Version:

Check version in SafeQ web interface under Help > About or via administration console.

Verify Fix Applied:

After applying MU106, verify the password field in Workflow Connector configuration cannot be revealed via browser developer tools.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrator access patterns to SafeQ interface
  • Multiple failed authentication attempts to workflow connectors

Network Indicators:

  • Unexpected connections from SafeQ server to scanning workflow endpoints

SIEM Query:

source="safeq" AND (event_type="admin_login" OR event_type="connector_access")

🔗 References

📤 Share & Export