CVE-2025-40896 PUBLISHED

Lack of TLS certificate validation when connecting Arc to a Guardian or CMC, in Arc before v2.2.0

Assigner: Nozomi
Reserved: 16.04.2025 Published: 04.03.2026 Updated: 04.03.2026

The server certificate was not verified when an Arc agent connected to a Guardian or CMC.

A malicious actor could perform a man-in-the-middle attack and intercept the communication between the Arc agent and the Guardian or CMC. This could result in theft of the client token and sensitive information (such as assets and alerts), impersonation of the server, or injection of spoofed data (such as false asset information or vulnerabilities) into the Guardian or CMC.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS Score: 6.3

Product Status

Vendor Nozomi Networks
Product Arc
Versions Default: unaffected
  • affected from 0 to 2.2.0 (excl.)

Solutions

Upgrade Arc to v2.2.0 or later.

Credits

  • This issue was found by Felix Eberstaller of Limes Security during a VAPT testing session commissioned by one of our customers. finder

References

Problem Types

  • CWE-295 Improper Certificate Validation CWE

Impacts

  • CAPEC-475 Signature Spoofing by Improper Validation