Cyber Posture

CVE-2025-40898

High

Published: 18 December 2025

Published
18 December 2025
Modified
14 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0010 27.9th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-40898 is a high-severity Path Traversal (CWE-22) vulnerability in Nozominetworks Cmc. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 27.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the insufficient validation of input files in the Arc data import functionality, preventing path traversal and arbitrary file writes.

prevent

Enables timely patching of the specific path traversal flaw as recommended in the Nozomi Networks and Siemens vendor advisories.

prevent

Enforces logical access controls to restrict file writes to authorized paths only, mitigating unauthorized configuration changes even if path traversal occurs.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

Path traversal vulnerability enables authenticated remote exploitation for arbitrary file writes, directly mapping to Exploitation for Privilege Escalation (T1068) from limited privileges and Exploitation of Remote Services (T1210).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A path traversal vulnerability was discovered in the Import Arc data archive functionality due to insufficient validation of the input file. An authenticated user with limited privileges, by uploading a specifically-crafted Arc data archive, can potentially write arbitrary files in…

more

arbitrary paths, altering the device configuration and/or affecting its availability.

Deeper analysisAI

CVE-2025-40898 is a path traversal vulnerability (CWE-22) discovered in the Import Arc data archive functionality, stemming from insufficient validation of input files. Published on 2025-12-18 with a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H), it affects Nozomi Networks devices, as detailed in security advisory NN-2025:15-01, and is also referenced in Siemens product certification advisory SSA-827968.

An authenticated user with limited privileges can exploit the vulnerability over the network with low complexity and no user interaction required. By uploading a specifically crafted Arc data archive, the attacker can write arbitrary files to arbitrary paths on the device, potentially altering its configuration and/or impacting availability.

Mitigation guidance is provided in the vendor advisories, including Nozomi Networks' NN-2025:15-01 at https://security.nozominetworks.com/NN-2025:15-01 and Siemens' SSA-827968 at https://cert-portal.siemens.com/productcert/html/ssa-827968.html.

Details

CWE(s)

Affected Products

nozominetworks
cmc
≤ 25.5.0
nozominetworks
guardian
≤ 25.5.0

CVEs Like This One

CVE-2025-40889Same product: Nozominetworks Cmc
CVE-2025-11531Shared CWE-22
CVE-2026-20180Shared CWE-22
CVE-2026-28827Shared CWE-22
CVE-2025-66429Shared CWE-22
CVE-2025-46120Shared CWE-22
CVE-2026-33747Shared CWE-22
CVE-2025-40549Shared CWE-22
CVE-2025-55282Shared CWE-22
CVE-2024-48885Shared CWE-22

References