CVE-2025-26369

8.8 HIGH

📋 TL;DR

A missing authorization vulnerability in Q-Free MaxTime allows authenticated low-privileged users to escalate privileges by adding permissions to user groups via crafted HTTP requests. This affects all installations running version 2.11.0 or earlier. Attackers can gain administrative access without proper authorization checks.

💻 Affected Systems

Products:
  • Q-Free MaxTime
Versions: ≤ 2.11.0
Operating Systems: All supported OS for MaxTime
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with user authentication enabled are vulnerable. The vulnerability is in the user groups management component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers gain administrative privileges, modify all configurations, access sensitive data, and potentially disrupt traffic management operations.

🟠

Likely Case

Privilege escalation leading to unauthorized access to administrative functions, configuration changes, and potential data exfiltration.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication, and monitoring detecting privilege escalation attempts.

🌐 Internet-Facing: HIGH if MaxTime web interface is exposed to internet, as authenticated users can exploit from anywhere.
🏢 Internal Only: HIGH as authenticated internal users can exploit to gain administrative privileges and compromise the system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access but low privileges. Exploitation involves crafting HTTP requests to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: > 2.11.0

Vendor Advisory: https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26369

Restart Required: No

Instructions:

1. Contact Q-Free for updated version >2.11.0. 2. Backup configuration. 3. Apply patch/upgrade. 4. Verify authorization checks are enforced.

🔧 Temporary Workarounds

Network Access Control

all

Restrict access to MaxTime web interface to authorized users only using firewall rules.

Temporary Authorization Override

all

Implement additional authorization layer or WAF rules to block unauthorized user group modification requests.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate MaxTime from untrusted networks
  • Enforce principle of least privilege for all user accounts and monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check MaxTime version via admin interface or configuration files. If version ≤2.11.0, system is vulnerable.

Check Version:

Check web interface or configuration files for version information specific to MaxTime installation.

Verify Fix Applied:

After upgrade, test with low-privileged account attempting to modify user group permissions - should be denied.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /user-groups endpoints from low-privileged users
  • Unusual user privilege changes in audit logs
  • Failed authorization attempts followed by successful privilege modifications

Network Indicators:

  • HTTP traffic to user group management endpoints from unauthorized IPs or users
  • Unusual pattern of privilege modification requests

SIEM Query:

source="maxtime" AND (url_path="/user-groups" OR action="privilege_modify") AND user_role="low_privilege"

🔗 References

📤 Share & Export