Impact
A Stored HTML Injection vulnerability was discovered in the Time Machine Snapshot Diff functionality. An attacker can send crafted network packets at two different times and inject HTML tags into asset attributes across snapshots. When a user activates the Diff feature on those snapshots and performs certain GUI actions, the injected HTML renders in their browser, allowing phishing and open redirect attacks. Full XSS is prevented by input validation and Content Security Policy, but the injection still poses a risk through the rendered UI.
Affected Systems
Nozomi Networks CMC and Guardian versions prior to 25.5.0 are affected. The vulnerability exists in both products and impacts all deployments using the Time Machine Snapshot Diff feature before the 25.5.0 update.
Risk and Exploitability
The CVSS score of 2.3 indicates low severity, and the EPSS score of less than 1% shows a very low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attack complexity is high because it requires an unauthenticated attacker to send specific network packets, the victim to use the Diff feature, and to perform particular GUI actions. Under these constrained conditions the risk to systems with the feature enabled remains low, but the potential for phishing is significant enough to warrant patching.
OpenCVE Enrichment