CVE-2025-40898
Published: 18 December 2025
Description
A path traversal vulnerability was discovered in the Import Arc data archive functionality due to insufficient validation of the input file. An authenticated user with limited privileges, by uploading a specifically-crafted Arc data archive, can potentially write arbitrary files in…
more
arbitrary paths, altering the device configuration and/or affecting its availability.
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the insufficient validation of input files in the Arc data import functionality, preventing path traversal and arbitrary file writes.
Enables timely patching of the specific path traversal flaw as recommended in the Nozomi Networks and Siemens vendor advisories.
Enforces logical access controls to restrict file writes to authorized paths only, mitigating unauthorized configuration changes even if path traversal occurs.
Security SummaryAI
CVE-2025-40898 is a path traversal vulnerability (CWE-22) discovered in the Import Arc data archive functionality, stemming from insufficient validation of input files. Published on 2025-12-18 with a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H), it affects Nozomi Networks devices, as detailed in security advisory NN-2025:15-01, and is also referenced in Siemens product certification advisory SSA-827968.
An authenticated user with limited privileges can exploit the vulnerability over the network with low complexity and no user interaction required. By uploading a specifically crafted Arc data archive, the attacker can write arbitrary files to arbitrary paths on the device, potentially altering its configuration and/or impacting availability.
Mitigation guidance is provided in the vendor advisories, including Nozomi Networks' NN-2025:15-01 at https://security.nozominetworks.com/NN-2025:15-01 and Siemens' SSA-827968 at https://cert-portal.siemens.com/productcert/html/ssa-827968.html.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal vulnerability enables authenticated remote exploitation for arbitrary file writes, directly mapping to Exploitation for Privilege Escalation (T1068) from limited privileges and Exploitation of Remote Services (T1210).