Cyber Posture

CVE-2025-26359

Critical

Published: 12 February 2025

Published
12 February 2025
Modified
28 October 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0129 79.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-26359 is a critical-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Q-Free Maxtime. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Account Manipulation (T1098); ranked in the top 20.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Account Manipulation (T1098) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly identifies and restricts critical functions like unauthenticated PIN resets to only explicitly documented non-sensitive actions.

prevent

Enforces approved authorizations for access to system resources, preventing unauthenticated crafted requests to the PIN reset endpoint.

prevent

Requires secure account management including notifications of changes and disabling compromised accounts, mitigating impacts of unauthorized PIN resets.

MITRE ATT&CK Enterprise TechniquesAI

T1098 Account Manipulation Persistence
Adversaries may manipulate accounts to maintain and/or elevate access to victim systems.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Missing authentication for PIN reset function in public-facing web application enables unauthenticated remote exploitation (T1190) and account manipulation via credential reset (T1098).

NVD Description

A CWE-306 "Missing Authentication for Critical Function" in maxprofile/accounts/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to reset user PINs via crafted HTTP requests.

Deeper analysisAI

CVE-2025-26359, published on 2025-02-12, is a critical vulnerability with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). It manifests as a CWE-306 Missing Authentication for Critical Function in the maxprofile/accounts/routes.lua component of Q-Free MaxTime versions less than or equal to 2.11.0. This flaw allows an unauthenticated remote attacker to reset user PINs by sending crafted HTTP requests to the affected endpoint.

The vulnerability can be exploited by any unauthenticated attacker with network access to the Q-Free MaxTime instance, requiring low attack complexity and no privileges, user interaction, or special conditions. Exploitation enables the attacker to arbitrarily reset user PINs, which can facilitate account takeovers, unauthorized access to protected functions, and broader system compromise, resulting in high impacts across confidentiality, integrity, and availability.

For mitigation details, refer to the vulnerability advisory from Nozomi Networks at https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26359.

Details

CWE(s)

Affected Products

q-free
maxtime
≤ 2.11.0

CVEs Like This One

CVE-2025-26347Same product: Q-Free Maxtime
CVE-2025-26341Same product: Q-Free Maxtime
CVE-2025-26366Same product: Q-Free Maxtime
CVE-2025-26344Same product: Q-Free Maxtime
CVE-2025-26362Same product: Q-Free Maxtime
CVE-2025-26365Same product: Q-Free Maxtime
CVE-2025-26363Same product: Q-Free Maxtime
CVE-2025-26345Same product: Q-Free Maxtime
CVE-2025-26339Same product: Q-Free Maxtime
CVE-2025-26342Same product: Q-Free Maxtime

References