CVE-2025-26364
Published: 12 February 2025
Summary
CVE-2025-26364 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Q-Free Maxtime. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 31.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires organizations to identify, authorize, and limit critical functions like disabling authentication servers that can be performed without identification or authentication, preventing exploitation of the unauthenticated endpoint.
Mandates enforcement of access control policies by systems, ensuring authentication is required before allowing critical operations such as disabling the authentication profile server via HTTP requests.
Requires timely identification, reporting, and remediation of flaws, directly addressing the missing authentication in the maxprofile/setup/routes.lua component to prevent remote exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability (CWE-306) in a public-facing management web application allows unauthenticated remote attackers to disable an authentication profile server via crafted HTTP requests, enabling exploitation of public-facing applications (T1190), service stop (T1489), and impairing defenses by disabling security tools (T1562.001).
NVD Description
A CWE-306 "Missing Authentication for Critical Function" in maxprofile/setup/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to disable an authentication profile server via crafted HTTP requests.
Deeper analysisAI
CVE-2025-26364 is a CWE-306 "Missing Authentication for Critical Function" vulnerability in the maxprofile/setup/routes.lua component of Q-Free MaxTime versions less than or equal to 2.11.0. It enables an unauthenticated remote attacker to disable an authentication profile server by sending crafted HTTP requests, with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
Any unauthenticated attacker with network access to the vulnerable Q-Free MaxTime instance can exploit this flaw without requiring privileges, user interaction, or special conditions. Exploitation disrupts the authentication profile server, resulting in high integrity impact by potentially bypassing or disabling authentication mechanisms.
The Nozomi Networks vulnerability advisory at https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26364 provides additional details on this issue.
Details
- CWE(s)