๐Ÿ” CVE Alert

CVE-2025-40898

HIGH 8.1

Path traversal in Import Arc data archive functionality in Guardian/CMC before 25.5.0

CVSS Score
8.1
EPSS Score
0.1%
EPSS Percentile
30th

A path traversal vulnerability was discovered in the Import Arc data archive functionality due to insufficient validation of the input file. An authenticated user with limited privileges, by uploading a specifically-crafted Arc data archive, can potentially write arbitrary files in arbitrary paths, altering the device configuration and/or affecting its availability.

CWE CWE-22
Vendor nozomi networks
Product guardian
Published Dec 18, 2025
Last Updated Apr 14, 2026
Stay Ahead of the Next One

Get instant alerts for nozomi networks guardian

Be the first to know when new high vulnerabilities affecting nozomi networks guardian are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High

Affected Versions

Nozomi Networks / Guardian
0 < 25.5.0
Nozomi Networks / CMC
0 < 25.5.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
security.nozominetworks.com: https://security.nozominetworks.com/NN-2025:15-01 cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-827968.html

Credits

This issue was found by Andrea Palanca of Nozomi Networks Product Security team during an internal investigation.