Cyber Posture

CVE-2025-40898

High

Published: 18 December 2025

Published
18 December 2025
Modified
14 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0013 31.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

A path traversal vulnerability was discovered in the Import Arc data archive functionality due to insufficient validation of the input file. An authenticated user with limited privileges, by uploading a specifically-crafted Arc data archive, can potentially write arbitrary files in…

more

arbitrary paths, altering the device configuration and/or affecting its availability.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the insufficient validation of input files in the Arc data import functionality, preventing path traversal and arbitrary file writes.

prevent

Enables timely patching of the specific path traversal flaw as recommended in the Nozomi Networks and Siemens vendor advisories.

prevent

Enforces logical access controls to restrict file writes to authorized paths only, mitigating unauthorized configuration changes even if path traversal occurs.

Security SummaryAI

CVE-2025-40898 is a path traversal vulnerability (CWE-22) discovered in the Import Arc data archive functionality, stemming from insufficient validation of input files. Published on 2025-12-18 with a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H), it affects Nozomi Networks devices, as detailed in security advisory NN-2025:15-01, and is also referenced in Siemens product certification advisory SSA-827968.

An authenticated user with limited privileges can exploit the vulnerability over the network with low complexity and no user interaction required. By uploading a specifically crafted Arc data archive, the attacker can write arbitrary files to arbitrary paths on the device, potentially altering its configuration and/or impacting availability.

Mitigation guidance is provided in the vendor advisories, including Nozomi Networks' NN-2025:15-01 at https://security.nozominetworks.com/NN-2025:15-01 and Siemens' SSA-827968 at https://cert-portal.siemens.com/productcert/html/ssa-827968.html.

Details

CWE(s)

Affected Products

nozominetworks
cmc
≤ 25.5.0
nozominetworks
guardian
≤ 25.5.0

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

Path traversal vulnerability enables authenticated remote exploitation for arbitrary file writes, directly mapping to Exploitation for Privilege Escalation (T1068) from limited privileges and Exploitation of Remote Services (T1210).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References