CVE-2025-26375

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated low-privileged users in Q-Free MaxTime systems to create new user accounts with arbitrary administrative privileges through crafted HTTP requests. It affects all Q-Free MaxTime installations running version 2.11.0 or earlier. Attackers can escalate privileges to gain full system control.

💻 Affected Systems

Products:
  • Q-Free MaxTime
Versions: <= 2.11.0
Operating Systems: Not OS-specific - affects the application itself
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access, but even low-privileged accounts can exploit this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full administrative control over the MaxTime system, allowing them to modify configurations, access sensitive data, disrupt operations, or establish persistence for further attacks.

🟠

Likely Case

Privilege escalation leading to unauthorized administrative access, potentially enabling data theft, system manipulation, or lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation, monitoring, and least privilege principles are enforced, though the vulnerability still exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of the vulnerable endpoint, but the attack itself is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version > 2.11.0

Vendor Advisory: https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26375

Restart Required: No

Instructions:

1. Contact Q-Free for the latest patched version. 2. Backup current configuration and data. 3. Apply the vendor-provided patch or upgrade to version > 2.11.0. 4. Verify the fix by testing user creation functionality.

🔧 Temporary Workarounds

Restrict Access to Vulnerable Endpoint

all

Implement network access controls or web application firewall rules to restrict access to the /maxprofile/users/ endpoint.

Implement Additional Authorization Layer

all

Add middleware or proxy authentication that validates user privileges before allowing user creation requests.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate MaxTime systems from critical infrastructure
  • Enhance monitoring and alerting for unusual user creation activities or privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check MaxTime version via admin interface or configuration files. If version is 2.11.0 or earlier, the system is vulnerable.

Check Version:

Check MaxTime web interface or configuration files for version information

Verify Fix Applied:

After patching, attempt to create a user with elevated privileges using a low-privileged account. This should fail with proper authorization errors.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /maxprofile/users/ endpoints
  • User creation events from non-admin accounts
  • Multiple failed authorization attempts followed by successful user creation

Network Indicators:

  • HTTP POST requests to user creation endpoints from unexpected source IPs
  • Traffic patterns showing privilege escalation attempts

SIEM Query:

source="maxtime" AND (uri_path="/maxprofile/users/" OR event_type="user_creation") AND user_role!="admin"

🔗 References

📤 Share & Export