CVE-2025-40889
Published: 07 October 2025
Summary
CVE-2025-40889 is a high-severity Path Traversal (CWE-22) vulnerability in Nozominetworks Cmc. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Data Destruction (T1485); ranked at the 27.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the missing validation of input parameters that enables path traversal attacks in the Time Machine functionality.
Enforces access control policies to restrict unauthorized alterations to files in the /data folder even if path traversal bypasses application logic.
Requires timely identification, reporting, and correction of the specific path traversal flaw to eliminate the vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal enables direct file content/structure modification and availability impact in /data, mapping to stored data manipulation and data destruction.
NVD Description
A path traversal vulnerability was discovered in the Time Machine functionality due to missing validation of two input parameters. An authenticated user with limited privileges, by issuing a specifically-crafted request, can potentially alter the structure and content of files in…
more
the /data folder, and/or affect their availability.
Deeper analysisAI
CVE-2025-40889, published on 2025-10-07, is a path traversal vulnerability (CWE-22) in the Time Machine functionality, stemming from missing validation of two input parameters. The vulnerability affects Nozomi Networks software and carries a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H), indicating high impact on integrity and availability with no confidentiality impact.
An authenticated attacker with limited privileges can exploit the vulnerability over the network with low complexity by issuing a specifically crafted request. Successful exploitation allows the attacker to potentially alter the structure and content of files in the /data folder and/or affect their availability.
Mitigation details are provided in the Nozomi Networks security advisory NN-2025:9-01, available at https://security.nozominetworks.com/NN-2025:9-01.
Details
- CWE(s)