CVE-2025-40896
Lack of TLS certificate validation when connecting Arc to a Guardian or CMC, in Arc before v2.2.0
CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th
The server certificate was not verified when an Arc agent connected to a Guardian or CMC. A malicious actor could perform a man-in-the-middle attack and intercept the communication between the Arc agent and the Guardian or CMC. This could result in theft of the client token and sensitive information (such as assets and alerts), impersonation of the server, or injection of spoofed data (such as false asset information or vulnerabilities) into the Guardian or CMC.
| CWE | CWE-295 |
| Vendor | nozomi networks |
| Product | arc |
| Published | Mar 4, 2026 |
| Last Updated | Mar 4, 2026 |
Stay Ahead of the Next One
Get instant alerts for nozomi networks arc
Be the first to know when new medium vulnerabilities affecting nozomi networks arc are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Affected Versions
Nozomi Networks / Arc
0 < 2.2.0
References
Credits
This issue was found by Felix Eberstaller of Limes Security during a VAPT testing session commissioned by one of our customers.