CVE-2025-40898

8.1 HIGH

📋 TL;DR

This path traversal vulnerability allows authenticated users with limited privileges to upload malicious Arc data archives that can write arbitrary files to any location on the system. This could lead to device configuration manipulation or system availability issues. The vulnerability affects systems using the vulnerable Import Arc data archive functionality.

💻 Affected Systems

Products:
  • Nozomi Networks Guardian/CMC products with Arc data import functionality
Versions: Specific versions not detailed in reference; check vendor advisory
Operating Systems: Linux-based systems running Nozomi Networks software
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to the Arc data import feature

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through arbitrary file writes, enabling configuration alteration, service disruption, or potential remote code execution by overwriting critical system files.

🟠

Likely Case

Unauthorized configuration changes leading to service disruption, data manipulation, or privilege escalation within the affected application.

🟢

If Mitigated

Limited impact with proper file permission restrictions and input validation, potentially only affecting non-critical application files.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of the Arc archive format

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Nozomi Networks advisory for specific patched versions

Vendor Advisory: https://security.nozominetworks.com/NN-2025:15-01

Restart Required: Yes

Instructions:

1. Access Nozomi Networks support portal
2. Download latest patched version
3. Backup current configuration
4. Apply update following vendor documentation
5. Restart affected services

🔧 Temporary Workarounds

Disable Arc Import Functionality

linux

Temporarily disable the vulnerable Arc data import feature until patching

Consult Nozomi Networks documentation for feature disablement procedures

Restrict User Access

all

Limit Arc import functionality to trusted administrative users only

Review and modify user role permissions in Nozomi Networks administration interface

🧯 If You Can't Patch

  • Implement strict file system permissions to limit write access to critical directories
  • Monitor and audit all Arc import activities and file system changes

🔍 How to Verify

Check if Vulnerable:

Check if Arc import functionality is enabled and accessible to non-admin users

Check Version:

Check Nozomi Networks administration interface for software version

Verify Fix Applied:

Verify installed version matches patched version from vendor advisory and test Arc import with malicious payload

📡 Detection & Monitoring

Log Indicators:

  • Unusual Arc import activities
  • File write operations outside expected directories
  • Multiple failed import attempts

Network Indicators:

  • Unusual data uploads to Arc import endpoints

SIEM Query:

source="nozomi_logs" AND (event_type="arc_import" OR file_write_path CONTAINS "../")

🔗 References

📤 Share & Export