A path traversal vulnerability was discovered in the Import Arc data archive functionality due to insufficient validation of the input file. An authenticated user with limited privileges, by uploading a specifically-crafted Arc data archive, can potentially write arbitrary files in arbitrary paths, altering the device configuration and/or affecting its availability.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://security.nozominetworks.com/NN-2025:15-01 |
|
History
Thu, 18 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 18 Dec 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path traversal vulnerability was discovered in the Import Arc data archive functionality due to insufficient validation of the input file. An authenticated user with limited privileges, by uploading a specifically-crafted Arc data archive, can potentially write arbitrary files in arbitrary paths, altering the device configuration and/or affecting its availability. | |
| Title | Path traversal in Import Arc data archive functionality in Guardian/CMC before 25.5.0 | |
| First Time appeared |
Nozomi Networks
Nozomi Networks cmc Nozomi Networks guardian |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:nozomi_networks:cmc:*:*:*:*:*:*:*:* cpe:2.3:a:nozomi_networks:guardian:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Nozomi Networks
Nozomi Networks cmc Nozomi Networks guardian |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2025-12-18T14:19:23.988Z
Reserved: 2025-04-16T09:04:35.922Z
Link: CVE-2025-40898
Updated: 2025-12-18T14:19:13.838Z
Status : Awaiting Analysis
Published: 2025-12-18T14:15:59.780
Modified: 2025-12-18T15:07:18.427
Link: CVE-2025-40898
No data.
OpenCVE Enrichment
No data.