CVE-2025-40895

4.8 MEDIUM

📋 TL;DR

A stored HTML injection vulnerability in CMC's Sensor Map allows authenticated administrators on connected Guardian devices to inject malicious HTML into Guardian properties. When CMC users interact with the Sensor Map, this HTML renders in their browsers, enabling phishing and open redirect attacks. The vulnerability affects CMC systems with Sensor Map functionality enabled and connected Guardian devices.

💻 Affected Systems

Products:
  • CMC (Central Management Console)
  • Guardian devices connected to CMC
Versions: Not specified in provided information
Operating Systems: Not specified
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Sensor Map functionality to be enabled in CMC and malicious authenticated administrator on connected Guardian device.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Successful phishing campaigns leading to credential theft or open redirect attacks that could redirect users to malicious sites, though full XSS exploitation is prevented by existing controls.

🟠

Likely Case

Limited phishing attempts against CMC users or redirection to external sites, with impact constrained by the need for administrator privileges on Guardian devices.

🟢

If Mitigated

Minimal impact due to existing input validation and Content Security Policy preventing script execution and information disclosure.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator privileges on Guardian device and victim CMC user interaction with Sensor Map.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided information

Vendor Advisory: https://security.nozominetworks.com/NN-2025:17-01

Restart Required: No

Instructions:

Apply vendor patch referenced in security advisory. Update both CMC and Guardian devices to patched versions.

🔧 Temporary Workarounds

Disable Sensor Map functionality

all

Temporarily disable Sensor Map in CMC configuration to prevent HTML rendering from Guardian properties.

Refer to CMC documentation for Sensor Map disable procedure

Restrict Guardian administrator privileges

all

Limit Guardian device administrator accounts to trusted personnel only.

Implement strict access controls for Guardian administrative interfaces

🧯 If You Can't Patch

  • Disable Sensor Map functionality in CMC configuration
  • Implement network segmentation to isolate Guardian devices from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check if Sensor Map is enabled in CMC and verify Guardian device versions against patched versions in vendor advisory.

Check Version:

Refer to CMC and Guardian device documentation for version check commands

Verify Fix Applied:

Confirm both CMC and Guardian devices are updated to versions specified in vendor patch notes.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTML content in Guardian property modification logs
  • Multiple Guardian property edits from single administrator account

Network Indicators:

  • Unexpected redirects from CMC Sensor Map interface

SIEM Query:

Search for Guardian property modification events containing HTML tags or suspicious URL patterns

🔗 References

📤 Share & Export