CVE-2025-40898

A path traversal vulnerability was discovered in the Import Arc data archive functionality due to insufficient validation of the input file. An authenticated user with limited privileges, by uploading a specifically-crafted Arc data archive, can potentially write arbitrary files in arbitrary paths, altering the device configuration and/or affecting its availability.
References
Link Resource
https://security.nozominetworks.com/NN-2025:15-01 Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nozominetworks:cmc:*:*:*:*:*:*:*:*
cpe:2.3:a:nozominetworks:guardian:*:*:*:*:*:*:*:*

History

06 Jan 2026, 20:08

Type Values Removed Values Added
First Time Nozominetworks
Nozominetworks guardian
Nozominetworks cmc
CPE cpe:2.3:a:nozominetworks:cmc:*:*:*:*:*:*:*:*
cpe:2.3:a:nozominetworks:guardian:*:*:*:*:*:*:*:*
References () https://security.nozominetworks.com/NN-2025:15-01 - () https://security.nozominetworks.com/NN-2025:15-01 - Mitigation, Vendor Advisory

18 Dec 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-18 14:15

Updated : 2026-01-06 20:08


NVD link : CVE-2025-40898

Mitre link : CVE-2025-40898

CVE.ORG link : CVE-2025-40898


JSON object : View

Products Affected

nozominetworks

  • cmc
  • guardian
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')