CVE-2025-26363
📋 TL;DR
This vulnerability allows unauthenticated remote attackers to enable authentication profile servers in Q-Free MaxTime traffic management systems via crafted HTTP requests. It affects all Q-Free MaxTime installations running version 2.11.0 or earlier. Attackers can potentially modify system authentication settings without credentials.
💻 Affected Systems
- Q-Free MaxTime
📦 What is this software?
Maxtime by Q Free
⚠️ Risk & Real-World Impact
Worst Case
Attackers could enable rogue authentication servers, potentially intercepting or bypassing authentication for the entire traffic management system, leading to unauthorized access, data manipulation, or service disruption.
Likely Case
Attackers enable unauthorized authentication profiles, potentially creating backdoors or disrupting legitimate authentication flows, though full system compromise would require additional vulnerabilities.
If Mitigated
With proper network segmentation and authentication controls, impact is limited to the specific vulnerable component, preventing lateral movement to critical systems.
🎯 Exploit Status
The vulnerability requires crafting HTTP requests to the vulnerable endpoint, which is relatively straightforward for attackers with basic HTTP knowledge.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version > 2.11.0
Vendor Advisory: https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26363
Restart Required: No
Instructions:
1. Contact Q-Free for updated MaxTime version > 2.11.0. 2. Backup current configuration. 3. Apply the update following vendor instructions. 4. Verify the fix by testing authentication profile functionality.
🔧 Temporary Workarounds
Network Access Control
LinuxRestrict network access to the MaxTime web interface to only trusted IP addresses or networks
iptables -A INPUT -p tcp --dport [MaxTime_port] -s [trusted_network] -j ACCEPT
iptables -A INPUT -p tcp --dport [MaxTime_port] -j DROP
Web Server Configuration
allAdd authentication requirements to the vulnerable endpoint via web server configuration
# Add to Apache config: <Location "/maxprofile/setup/">
AuthType Basic
AuthName "Restricted"
Require valid-user
</Location>
🧯 If You Can't Patch
- Implement strict network segmentation to isolate MaxTime systems from untrusted networks
- Deploy a web application firewall (WAF) with rules to block unauthorized requests to the /maxprofile/setup/ endpoint
🔍 How to Verify
Check if Vulnerable:
Check if MaxTime version is ≤ 2.11.0 via admin interface or configuration files. Test by sending unauthenticated HTTP POST requests to the /maxprofile/setup/ endpoint.
Check Version:
Check MaxTime web interface admin panel or configuration files for version information
Verify Fix Applied:
After patching, verify version is > 2.11.0. Test that unauthenticated requests to /maxprofile/setup/ endpoints now require authentication or are properly rejected.
📡 Detection & Monitoring
Log Indicators:
- Unusual HTTP POST requests to /maxprofile/setup/ endpoints from unauthenticated sources
- Authentication profile configuration changes without corresponding legitimate user activity
Network Indicators:
- HTTP traffic to /maxprofile/setup/ endpoints from unexpected source IPs
- Unusual authentication-related network traffic patterns
SIEM Query:
source="MaxTime_logs" AND (uri_path="/maxprofile/setup/" AND http_method="POST") AND user="-"