A path traversal vulnerability was discovered in the Import Arc data archive functionality due to insufficient validation of the input file. An authenticated user with limited privileges, by uploading a specifically-crafted Arc data archive, can potentially write arbitrary files in arbitrary paths, altering the device configuration and/or affecting its availability.
Advisories

No advisories yet.

Fixes

Solution

Upgrade to v25.5.0 or later.


Workaround

Use internal firewall features to limit access to the web management interface.

History

Thu, 18 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 13:30:00 +0000

Type Values Removed Values Added
Description A path traversal vulnerability was discovered in the Import Arc data archive functionality due to insufficient validation of the input file. An authenticated user with limited privileges, by uploading a specifically-crafted Arc data archive, can potentially write arbitrary files in arbitrary paths, altering the device configuration and/or affecting its availability.
Title Path traversal in Import Arc data archive functionality in Guardian/CMC before 25.5.0
First Time appeared Nozomi Networks
Nozomi Networks cmc
Nozomi Networks guardian
Weaknesses CWE-22
CPEs cpe:2.3:a:nozomi_networks:cmc:*:*:*:*:*:*:*:*
cpe:2.3:a:nozomi_networks:guardian:*:*:*:*:*:*:*:*
Vendors & Products Nozomi Networks
Nozomi Networks cmc
Nozomi Networks guardian
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}

cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Nozomi

Published:

Updated: 2025-12-18T14:19:23.988Z

Reserved: 2025-04-16T09:04:35.922Z

Link: CVE-2025-40898

cve-icon Vulnrichment

Updated: 2025-12-18T14:19:13.838Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-18T14:15:59.780

Modified: 2025-12-18T15:07:18.427

Link: CVE-2025-40898

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses