CVE-2025-26357

4.9 MEDIUM

📋 TL;DR

This vulnerability allows authenticated remote attackers to read sensitive files on Q-Free MaxTime systems via path traversal attacks. Attackers can access files outside the intended directory by crafting malicious HTTP requests. Organizations using Q-Free MaxTime version 2.11.0 or earlier are affected.

💻 Affected Systems

Products:
  • Q-Free MaxTime
Versions: Versions ≤ 2.11.0
Operating Systems: Not specified, likely various Linux distributions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the MaxTime API endpoint at /maxtime/api/database/database.lua

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through reading of configuration files, credentials, or sensitive system files leading to further attacks.

🟠

Likely Case

Unauthorized access to sensitive configuration files, database credentials, or system information that could enable lateral movement.

🟢

If Mitigated

Limited impact if proper authentication controls and file system permissions restrict access to critical files.

🌐 Internet-Facing: MEDIUM - Requires authentication but could be exploited if exposed to internet with valid credentials.
🏢 Internal Only: MEDIUM - Authenticated internal users or compromised accounts could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of the vulnerable endpoint. Path traversal attacks are generally straightforward to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version > 2.11.0

Vendor Advisory: https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26357

Restart Required: Yes

Instructions:

1. Contact Q-Free for updated version > 2.11.0. 2. Backup current configuration. 3. Install the patched version. 4. Restart MaxTime services. 5. Verify the fix.

🔧 Temporary Workarounds

Restrict API Access

linux

Implement network segmentation or firewall rules to restrict access to the vulnerable API endpoint

iptables -A INPUT -p tcp --dport [MaxTime_PORT] -s [TRUSTED_IPS] -j ACCEPT
iptables -A INPUT -p tcp --dport [MaxTime_PORT] -j DROP

File System Permissions

linux

Restrict file system permissions for the MaxTime service account to limit accessible directories

chmod 750 /path/to/maxtime
chown -R maxtime:maxtime /path/to/maxtime

🧯 If You Can't Patch

  • Implement strict authentication controls and monitor for suspicious API access patterns
  • Deploy web application firewall (WAF) with path traversal protection rules

🔍 How to Verify

Check if Vulnerable:

Check MaxTime version and test authenticated API requests with path traversal payloads to /maxtime/api/database/database.lua

Check Version:

Check MaxTime web interface or configuration files for version information

Verify Fix Applied:

Test with same path traversal payloads after patching - should return error or no file access

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in MaxTime logs
  • HTTP requests containing '../' or similar path traversal sequences to /maxtime/api/database/database.lua

Network Indicators:

  • HTTP requests with path traversal payloads to MaxTime API endpoint
  • Unusual file read patterns from MaxTime server

SIEM Query:

source="maxtime.log" AND ("../" OR "..\" OR "%2e%2e%2f") AND uri_path="/maxtime/api/database/database.lua"

🔗 References

📤 Share & Export