CVE-2025-1100

9.8 CRITICAL

📋 TL;DR

CVE-2025-1100 is a critical vulnerability in Q-Free MaxTime traffic management software where a hard-coded root password allows unauthenticated remote attackers to gain complete system control via SSH. This affects all organizations running Q-Free MaxTime version 2.11.0 or earlier. Attackers can execute arbitrary code with root privileges, potentially compromising entire traffic management systems.

💻 Affected Systems

Products:
  • Q-Free MaxTime
Versions: All versions ≤ 2.11.0
Operating Systems: Linux-based systems running Q-Free MaxTime
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations with SSH enabled are vulnerable. The hard-coded password cannot be changed without patching.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover allowing attackers to disrupt traffic management systems, manipulate traffic signals, exfiltrate sensitive data, or deploy ransomware across the network.

🟠

Likely Case

Attackers gain persistent root access to install backdoors, pivot to other systems, and maintain long-term control over traffic infrastructure.

🟢

If Mitigated

If SSH is disabled or network segmentation isolates the system, impact is limited to denial of service if attackers can still reach the system.

🌐 Internet-Facing: HIGH - SSH is typically exposed for remote management, making internet-facing systems immediately vulnerable to exploitation.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to attackers who gain network access through other means.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only SSH access and knowledge of the hard-coded password. No authentication or special conditions needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.11.1 or later

Vendor Advisory: https://www.q-free.com/security-advisories

Restart Required: Yes

Instructions:

1. Contact Q-Free support for patch files. 2. Backup configuration and data. 3. Apply the patch following vendor instructions. 4. Restart the MaxTime service. 5. Verify SSH access requires proper authentication.

🔧 Temporary Workarounds

Disable SSH Service

linux

Temporarily disable SSH to prevent remote exploitation while patching

sudo systemctl stop ssh
sudo systemctl disable ssh

Block SSH Port with Firewall

linux

Block SSH access at network level while maintaining service functionality

sudo iptables -A INPUT -p tcp --dport 22 -j DROP
sudo iptables-save > /etc/iptables/rules.v4

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate MaxTime systems from untrusted networks
  • Deploy host-based intrusion detection and monitor for SSH authentication attempts using the hard-coded password

🔍 How to Verify

Check if Vulnerable:

Attempt SSH login with the known hard-coded password (check security advisories for specific password). If login succeeds without proper authentication, system is vulnerable.

Check Version:

Check MaxTime web interface or configuration files for version information, or contact Q-Free support

Verify Fix Applied:

Verify SSH login with hard-coded password fails and requires proper authentication. Check MaxTime version is >2.11.0.

📡 Detection & Monitoring

Log Indicators:

  • Failed SSH authentication attempts followed by successful login with specific username
  • SSH log entries showing root login from unexpected sources
  • Authentication logs showing password-based SSH login

Network Indicators:

  • SSH connections to port 22 from unexpected IP addresses
  • Unusual SSH traffic patterns outside maintenance windows

SIEM Query:

source="auth.log" AND "sshd" AND ("Accepted password" OR "session opened") AND user="root" | stats count by src_ip

🔗 References

📤 Share & Export