CVE-2025-26367
📋 TL;DR
This vulnerability allows authenticated low-privileged attackers to create arbitrary user groups in Q-Free MaxTime traffic management systems. Attackers can escalate privileges by creating administrative groups or manipulate system access controls. Organizations using Q-Free MaxTime version 2.11.0 or earlier are affected.
💻 Affected Systems
- Q-Free MaxTime
📦 What is this software?
Maxtime by Q Free
⚠️ Risk & Real-World Impact
Worst Case
Attackers create administrative user groups, gain full system control, manipulate traffic management operations, and potentially disrupt critical infrastructure.
Likely Case
Attackers create unauthorized user groups to escalate privileges, bypass access controls, and gain unauthorized access to sensitive traffic management functions.
If Mitigated
With proper network segmentation and authentication controls, impact is limited to unauthorized group creation within the application scope.
🎯 Exploit Status
Exploitation requires authenticated access and crafting HTTP requests to the vulnerable endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version > 2.11.0
Vendor Advisory: https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26367
Restart Required: Yes
Instructions:
1. Contact Q-Free for patched version >2.11.0
2. Backup current configuration
3. Apply the update following vendor instructions
4. Restart MaxTime services
5. Verify authorization controls are functioning
🔧 Temporary Workarounds
Network Access Restriction
allRestrict network access to MaxTime web interface to authorized users only
Web Application Firewall Rules
allImplement WAF rules to block unauthorized POST requests to /maxprofile/user-groups/ endpoints
🧯 If You Can't Patch
- Implement strict network segmentation to isolate MaxTime systems from untrusted networks
- Enforce principle of least privilege for all user accounts and regularly audit user group memberships
🔍 How to Verify
Check if Vulnerable:
Check MaxTime version via web interface or configuration files. If version ≤2.11.0, system is vulnerable.
Check Version:
Check web interface admin panel or configuration files for version information
Verify Fix Applied:
After patching, attempt to create user groups with low-privileged accounts - should be denied. Verify version >2.11.0.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /maxprofile/user-groups/ endpoints
- User group creation events from non-admin accounts
- Multiple failed authorization attempts
Network Indicators:
- HTTP POST requests to vulnerable endpoints from unexpected sources
- Unusual traffic patterns to MaxTime web interface
SIEM Query:
source="maxtime" AND (uri_path="/maxprofile/user-groups/" AND http_method="POST") AND user_role!="admin"