Metrics
Affected Vendors & Products
No advisories yet.
Solution
Upgrade to v25.2.0 or later.
Workaround
Use internal firewall features to limit access to the web management interface.
Link | Providers |
---|---|
https://security.nozominetworks.com/NN-2025:9-01 |
![]() ![]() |
Wed, 08 Oct 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Nozominetworks
Nozominetworks cmc Nozominetworks guardian |
|
Vendors & Products |
Nozominetworks
Nozominetworks cmc Nozominetworks guardian |
Tue, 07 Oct 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 07 Oct 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A path traversal vulnerability was discovered in the Time Machine functionality due to missing validation of two input parameters. An authenticated user with limited privileges, by issuing a specifically-crafted request, can potentially alter the structure and content of files in the /data folder, and/or affect their availability. | |
Title | Path traversal in Time Machine functionality in Guardian/CMC before 25.2.0 | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2025-10-07T13:08:57.420Z
Reserved: 2025-04-16T09:04:16.894Z
Link: CVE-2025-40889

Updated: 2025-10-07T13:08:50.437Z

Status : Awaiting Analysis
Published: 2025-10-07T13:15:35.170
Modified: 2025-10-08T19:38:32.610
Link: CVE-2025-40889

No data.

Updated: 2025-10-08T13:38:57Z