| Advisory ID | NN-2025:15-01 |
|---|---|
| Topic | Path traversal in Import Arc data archive functionality in Guardian/CMC before 25.5.0 |
| CWE Impact | CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
| Issue date | 2025-12-18 |
| Affects | Guardian, CMC < v25.5.0 |
| CVE Name(s) | CVE-2025-40898 |
| CVSS Details | CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
| CVSS Score | 7.2 (CVSS v4.0) 8.1 (CVSS v3.1) |
| CVE Risk Level | High (CVSS v4.0) High (CVSS v3.1) |
| Risk Level for Nozomi customers | Medium |
A path traversal vulnerability was discovered in the Import Arc data archive functionality due to insufficient validation of the input file.
An authenticated user with limited privileges, by uploading a specifically-crafted Arc data archive, can potentially write arbitrary files in arbitrary paths, altering the device configuration and/or affecting its availability.
Guardian, CMC < v25.5.0
Use internal firewall features to limit access to the web management interface. Review all accounts with access to it and delete unnecessary ones.
Upgrade to v25.5.0 or later.
We thank the following parties for their efforts: