Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
Upgrade to v25.5.0 or later.
Workaround
Use internal firewall features to limit access to the web management interface.
| Link | Providers |
|---|---|
| https://security.nozominetworks.com/NN-2025:15-01 |
|
Tue, 06 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nozominetworks
Nozominetworks cmc Nozominetworks guardian |
|
| CPEs | cpe:2.3:a:nozominetworks:cmc:*:*:*:*:*:*:*:* cpe:2.3:a:nozominetworks:guardian:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Nozominetworks
Nozominetworks cmc Nozominetworks guardian |
Thu, 18 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 18 Dec 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path traversal vulnerability was discovered in the Import Arc data archive functionality due to insufficient validation of the input file. An authenticated user with limited privileges, by uploading a specifically-crafted Arc data archive, can potentially write arbitrary files in arbitrary paths, altering the device configuration and/or affecting its availability. | |
| Title | Path traversal in Import Arc data archive functionality in Guardian/CMC before 25.5.0 | |
| First Time appeared |
Nozomi Networks
Nozomi Networks cmc Nozomi Networks guardian |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:nozomi_networks:cmc:*:*:*:*:*:*:*:* cpe:2.3:a:nozomi_networks:guardian:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Nozomi Networks
Nozomi Networks cmc Nozomi Networks guardian |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2025-12-18T14:19:23.988Z
Reserved: 2025-04-16T09:04:35.922Z
Link: CVE-2025-40898
Updated: 2025-12-18T14:19:13.838Z
Status : Analyzed
Published: 2025-12-18T14:15:59.780
Modified: 2026-01-06T20:08:13.530
Link: CVE-2025-40898
No data.
OpenCVE Enrichment
No data.