CVE-2025-26344

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to enable passwordless guest mode in Q-Free MaxTime systems via crafted HTTP requests. It affects all Q-Free MaxTime installations running version 2.11.0 or earlier. Attackers can bypass authentication controls without any credentials.

💻 Affected Systems

Products:
  • Q-Free MaxTime
Versions: <= 2.11.0
Operating Systems: Not OS-specific - affects the MaxTime application
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the maxprofile/guest-mode/routes.lua component. All installations with guest mode functionality are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing unauthorized access to all MaxTime functionality, potential data exfiltration, and disruption of parking/traffic management operations.

🟠

Likely Case

Unauthorized access to guest mode features, potential manipulation of parking/traffic data, and privilege escalation within the system.

🟢

If Mitigated

Limited impact if network segmentation and authentication controls prevent access to the vulnerable endpoint.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable via HTTP requests without authentication.
🏢 Internal Only: HIGH - Even internally, the lack of authentication requirement makes this highly exploitable.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Crafted HTTP requests to the vulnerable endpoint can enable guest mode without authentication. No special tools or advanced skills required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: > 2.11.0

Vendor Advisory: https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26344

Restart Required: Yes

Instructions:

1. Contact Q-Free for patched version >2.11.0. 2. Backup current configuration. 3. Apply the update following vendor instructions. 4. Restart MaxTime services. 5. Verify guest mode requires authentication.

🔧 Temporary Workarounds

Network Access Control

linux

Restrict network access to MaxTime web interface using firewall rules

iptables -A INPUT -p tcp --dport [MaxTime-port] -s [trusted-networks] -j ACCEPT
iptables -A INPUT -p tcp --dport [MaxTime-port] -j DROP

Disable Guest Mode

all

Temporarily disable guest mode functionality if not required

Edit MaxTime configuration to disable guest mode features

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate MaxTime systems from untrusted networks
  • Deploy web application firewall (WAF) rules to block requests to /maxprofile/guest-mode/ endpoints

🔍 How to Verify

Check if Vulnerable:

Check if MaxTime version is <=2.11.0 and test if unauthenticated HTTP POST to guest mode endpoint succeeds

Check Version:

Check MaxTime admin interface or configuration files for version information

Verify Fix Applied:

Verify version >2.11.0 and confirm guest mode endpoints require proper authentication

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated POST requests to /maxprofile/guest-mode/ endpoints
  • Guest mode activation without authentication logs

Network Indicators:

  • HTTP traffic to MaxTime guest mode endpoints from unauthorized sources
  • Unusual guest mode activation patterns

SIEM Query:

source="MaxTime" AND (url_path="/maxprofile/guest-mode/" OR event="guest_mode_activation") AND user="anonymous"

🔗 References

📤 Share & Export