No analysis available yet.
Vendor Solution
Upgrade to v25.2.0 or later.
Vendor Workaround
Use internal firewall features to limit access to the web management interface.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://security.nozominetworks.com/NN-2025:9-01 |
|
Thu, 09 Oct 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:nozominetworks:cmc:*:*:*:*:*:*:*:* cpe:2.3:a:nozominetworks:guardian:*:*:*:*:*:*:*:* |
Wed, 08 Oct 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nozominetworks
Nozominetworks cmc Nozominetworks guardian |
|
| Vendors & Products |
Nozominetworks
Nozominetworks cmc Nozominetworks guardian |
Tue, 07 Oct 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Oct 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path traversal vulnerability was discovered in the Time Machine functionality due to missing validation of two input parameters. An authenticated user with limited privileges, by issuing a specifically-crafted request, can potentially alter the structure and content of files in the /data folder, and/or affect their availability. | |
| Title | Path traversal in Time Machine functionality in Guardian/CMC before 25.2.0 | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2025-10-07T13:08:57.420Z
Reserved: 2025-04-16T09:04:16.894Z
Link: CVE-2025-40889
Updated: 2025-10-07T13:08:50.437Z
Status : Analyzed
Published: 2025-10-07T13:15:35.170
Modified: 2025-10-09T16:37:35.463
Link: CVE-2025-40889
No data.
OpenCVE Enrichment
Updated: 2025-10-08T13:38:57Z