CVE-2025-26372

7.1 HIGH

📋 TL;DR

This vulnerability allows authenticated low-privileged attackers to remove users from groups in Q-Free MaxTime systems via crafted HTTP requests. It affects Q-Free MaxTime versions up to and including 2.11.0. Organizations using vulnerable versions are at risk of unauthorized group membership changes.

💻 Affected Systems

Products:
  • Q-Free MaxTime
Versions: ≤ 2.11.0
Operating Systems: Not OS-specific - affects MaxTime application
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of vulnerable versions regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could remove administrators from critical groups, disrupting system management and potentially enabling privilege escalation or denial of service.

🟠

Likely Case

Low-privileged users removing other users from groups they shouldn't have access to, causing operational disruptions and unauthorized access changes.

🟢

If Mitigated

With proper authorization controls and monitoring, impact is limited to logged attempts with no successful unauthorized modifications.

🌐 Internet-Facing: MEDIUM - While authentication is required, exposed interfaces could be targeted by authenticated attackers.
🏢 Internal Only: HIGH - Internal users with low privileges could exploit this to disrupt operations and modify access controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and crafting specific HTTP requests to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version > 2.11.0

Vendor Advisory: https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26372

Restart Required: No

Instructions:

1. Contact Q-Free for updated version >2.11.0. 2. Backup current configuration. 3. Apply the update following vendor instructions. 4. Verify authorization checks are properly implemented.

🔧 Temporary Workarounds

Network Access Control

all

Restrict access to MaxTime user group management endpoints to authorized administrators only.

Enhanced Monitoring

all

Implement strict monitoring of user group modification requests and alert on suspicious patterns.

🧯 If You Can't Patch

  • Implement network segmentation to isolate MaxTime systems from general user access
  • Deploy web application firewall rules to block suspicious user group modification patterns

🔍 How to Verify

Check if Vulnerable:

Check MaxTime version via admin interface or configuration files. If version ≤2.11.0, system is vulnerable.

Check Version:

Check MaxTime web interface or configuration files for version information

Verify Fix Applied:

After patching, test that low-privileged users cannot remove users from groups via HTTP requests to the affected endpoint.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /maxprofile/user-groups/ endpoints from non-admin users
  • Unauthorized user group modification attempts in application logs

Network Indicators:

  • HTTP traffic to user group management endpoints from unexpected source IPs
  • Pattern of group modification requests from low-privileged accounts

SIEM Query:

source="maxtime" AND (uri_path="/maxprofile/user-groups/" OR event="group_modification") AND user_role!="admin"

🔗 References

📤 Share & Export