Metrics
Affected Vendors & Products
No advisories yet.
Solution
Upgrade to v25.2.0 or later.
Workaround
Use internal firewall features to limit access to the web management interface.
Link | Providers |
---|---|
https://security.nozominetworks.com/NN-2025:6-01 |
![]() ![]() |
Wed, 08 Oct 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Nozominetworks
Nozominetworks cmc Nozominetworks guardian |
|
Vendors & Products |
Nozominetworks
Nozominetworks cmc Nozominetworks guardian |
Tue, 07 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 07 Oct 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A SQL Injection vulnerability was discovered in the Smart Polling functionality due to improper validation of an input parameter. An authenticated user with limited privileges can execute arbitrary SELECT SQL statements on the DBMS used by the web application, potentially exposing unauthorized data. | |
Title | Authenticated SQL Injection on Smart Polling functionality in Guardian/CMC before 25.2.0 | |
Weaknesses | CWE-89 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2025-10-07T13:35:18.140Z
Reserved: 2025-04-16T09:04:16.893Z
Link: CVE-2025-40885

Updated: 2025-10-07T13:35:12.653Z

Status : Awaiting Analysis
Published: 2025-10-07T13:15:34.403
Modified: 2025-10-08T19:38:32.610
Link: CVE-2025-40885

No data.

Updated: 2025-10-08T13:39:06Z