Use of Hard-coded Cryptographic Key

CVE-2025-26340

Summary

A CWE-321 "Use of Hard-coded Cryptographic Key" in the JWT signing in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to bypass the authentication via crafted HTTP requests.

Impact

An unauthenticated remote attacker may bypass authentication and gain unauthorized access via crafted HTTP requests.

Issue Date

February 11, 2025

Affects

This issue affects: Q-Free MaxTime less than or equal to version 2.11.0.

CVE Name

CVE-2025-26340

CVSS Details

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS Score

8.8

Solution

An official solution has not been communicated by the vendor. The vulnerability can be exploited by unauthenticated remote attackers. As a temporary solution, until a patch is released, it is highly recommended to restrict and monitor the network access to the management web application exposed by devices running Q-Free MaxTime less than or equal to version 2.11.0.

Mitigations

Acknowledgements

Andrea Palanca of Nozomi Networks

Nozomi Threat Intelligence

Nozomi Networks Labs curates threat and vulnerability insights that are continuously fed into the Nozomi Networks platform to ensure our sensors can detect existing and emerging threats and vulnerabilities that threaten customers environments.

Learn more

Latest Labs Blogs

Threat Actor Activity Related to the Iran Conflict

Read

Fuzzing Protocol Implementations: 10 Vulnerabilities in the P-Net PROFINET Library

Read

Major Power Outage Hits Spain and Portugal: Spotlight on Critical Energy Infrastructure Vulnerabilities 

Read
View All

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your OT and IoT asset discovery, inventory, and management.