NN-2025:15-01

Path traversal in Import Arc data archive functionality in Guardian/CMC before 25.5.0

Last update: 2025-12-18

Advisory IDNN-2025:15-01
TopicPath traversal in Import Arc data archive functionality in Guardian/CMC before 25.5.0
CWE ImpactCWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Issue date2025-12-18
AffectsGuardian, CMC < v25.5.0
CVE Name(s)CVE-2025-40898
CVSS DetailsCVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
CVSS Score7.2 (CVSS v4.0)
8.1 (CVSS v3.1)
CVE Risk LevelHigh (CVSS v4.0)
High (CVSS v3.1)
Risk Level for Nozomi customersMedium

Summary

A path traversal vulnerability was discovered in the Import Arc data archive functionality due to insufficient validation of the input file.

Impact

An authenticated user with limited privileges, by uploading a specifically-crafted Arc data archive, can potentially write arbitrary files in arbitrary paths, altering the device configuration and/or affecting its availability.

Affected Products

Guardian, CMC < v25.5.0

Workarounds and Mitigations

Use internal firewall features to limit access to the web management interface. Review all accounts with access to it and delete unnecessary ones.

Solutions

Upgrade to v25.5.0 or later.

Modification History

2025-12-18: Initial revision

Related Links

Acknowledgements

We thank the following parties for their efforts:

  • Andrea Palanca of Nozomi Networks Product Security team for finding this issue during an internal investigation

Contact

Nozomi Networks Product Security team can be reached at prodsec@nozominetworks.com.
More contact details on the PSIRT page.