Nozominetworks Nozominetworks

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Nozominetworks product.

RSS Feeds for Nozominetworks security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Nozominetworks products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Nozominetworks Sorted by Most Security Vulnerabilities since 2018

Nozominetworks Guardian24 vulnerabilities

Nozominetworks Cmc22 vulnerabilities

Nozominetworks Arc1 vulnerability

By the Year

In 2026 there have been 3 vulnerabilities in Nozominetworks with an average score of 5.2 out of ten. Last year, in 2025 Nozominetworks had 5 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Nozominetworks in 2026 could surpass last years number. Last year, the average CVE base score was greater by 1.91




Year Vulnerabilities Average Score
2026 3 5.23
2025 5 7.14
2024 3 6.25
2023 11 6.85
2022 2 7.20
2021 2 6.05

It may take a day or so for new Nozominetworks vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Nozominetworks Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2025-40896 Mar 04, 2026
Nozomi Arc Agent TLS Cert Validation Flaw Enabling MITM The server certificate was not verified when an Arc agent connected to a Guardian or CMC. A malicious actor could perform a man-in-the-middle attack and intercept the communication between the Arc agent and the Guardian or CMC. This could result in theft of the client token and sensitive information (such as assets and alerts), impersonation of the server, or injection of spoofed data (such as false asset information or vulnerabilities) into the Guardian or CMC.
Arc
CVE-2025-40895 Mar 04, 2026
Nozomi CMC Stored XSS via Sensor Map (Guardians) A Stored HTML Injection vulnerability was discovered in the CMC's Sensor Map functionality due to improper validation on connected Guardians' properties. A malicious authenticated user with administrator privileges on a Guardian connected to a CMC can edit the Guardian's properties to inject HTML tags. If the Sensor Map functionality is enabled in the CMC, when a victim CMC user interacts with it, then the injected HTML may render in their browser, enabling phishing and possibly open redirect attacks. Full XSS exploitation and direct information disclosure are prevented by the existing input validation and Content Security Policy configuration.
Cmc
CVE-2025-40894 Mar 04, 2026
Stored XSS in Nozomi Alerted Nodes Dashboard A Stored HTML Injection vulnerability was discovered in the Alerted Nodes Dashboard functionality due to improper validation on an input parameter. A malicious authenticated user with the required privileges could edit a node label to inject HTML tags. If the system is configured to use the Alerted Nodes Dashboard, and alerts are reported for the affected node, then the injected HTML may render in the browser of a victim user interacting with it, enabling phishing and possibly open redirect attacks. Full XSS exploitation and direct information disclosure are prevented by the existing input validation and Content Security Policy configuration.
Guardian
Cmc
CVE-2025-40898 Dec 18, 2025
Path Traversal in Arc Import Allows Authenticated File Write A path traversal vulnerability was discovered in the Import Arc data archive functionality due to insufficient validation of the input file. An authenticated user with limited privileges, by uploading a specifically-crafted Arc data archive, can potentially write arbitrary files in arbitrary paths, altering the device configuration and/or affecting its availability.
Guardian
Cmc
CVE-2025-40893 Dec 18, 2025
Stored HTML Injection in Asset List via Network Packets A Stored HTML Injection vulnerability was discovered in the Asset List functionality due to improper validation of network traffic data. An unauthenticated attacker can send specially crafted network packets to inject HTML tags into asset attributes. When a victim views the affected assets in the Asset List (and similar functions), the injected HTML renders in their browser, enabling phishing and possibly open redirect attacks. Full XSS exploitation and direct information disclosure are prevented by the existing input validation and Content Security Policy configuration.
Guardian
Cmc
CVE-2025-40892 Dec 18, 2025
Stored XSS in Reports of Unknown Web App A Stored Cross-Site Scripting vulnerability was discovered in the Reports functionality due to improper validation of an input parameter. An authenticated user with report privileges can define a malicious report containing a JavaScript payload, or a victim can be socially engineered to import a malicious report template. When the victim views or imports the report, the XSS executes in their browser context, allowing the attacker to perform unauthorized actions as the victim, such as modify application data, disrupt application availability, and access limited sensitive information.
Guardian
Cmc
CVE-2025-40891 Dec 18, 2025
Stored HTML Injection in Time Machine Snapshot Diff via Network Packet Injection A Stored HTML Injection vulnerability was discovered in the Time Machine Snapshot Diff functionality due to improper validation of network traffic data. An unauthenticated attacker can send specially crafted network packets at two different times to inject HTML tags into asset attributes across two snapshots. Exploitation requires a victim to use the Time Machine Snapshot Diff feature on those specific snapshots and perform specific GUI actions, at which point the injected HTML renders in their browser, enabling phishing and open redirect attacks. Full XSS exploitation is prevented by input validation and Content Security Policy. Attack complexity is high due to multiple required conditions.
Guardian
Cmc
CVE-2025-40890 Nov 25, 2025
Grafana Stored XSS in Dashboard (CVE-2025-40890) A Stored Cross-Site Scripting vulnerability was discovered in the Dashboards functionality due to improper validation of an input parameter. An authenticated low-privilege user can craft a malicious dashboard containing a JavaScript payload and share it with victim users, or a victim can be socially engineered to import a malicious dashboard template. When the victim views or imports the dashboard, the XSS executes in their browser context, allowing the attacker to perform unauthorized actions as the victim, such as modify application data, disrupt application availability, and access limited sensitive information.
Guardian
Cmc
CVE-2024-4465 Sep 11, 2024
Access Control Bypass in Guardian/CMC Reports Lets Auth Users Alter SMTP Settings An access control vulnerability was discovered in the Reports section due to a specific access restriction not being properly enforced for users with limited privileges. If a logged-in user with reporting privileges learns how to create a specific application request, they might be able to make limited changes to the reporting configuration. This could result in a partial loss of data integrity. In Guardian/CMC instances with a reporting configuration, there could be limited Denial of Service (DoS) impacts, as the reports may not reach their intended destination, and there could also be limited information disclosure impacts. Furthermore, modifying the destination SMTP server for the reports could lead to the compromise of external credentials, as they might be sent to an unauthorized server. This could expand the scope of the attack.
Cmc
Guardian
CVE-2024-0218 Apr 10, 2024
Nozomi Networks Guardian IDS DoS via malformed Radius packets A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian, caused by improper input validation in certain fields used in the Radius parsing functionality of our IDS, allows an unauthenticated attacker sending specially crafted malformed network packets to cause the IDS module to stop updating nodes, links, and assets. Network traffic may not be analyzed until the IDS module is restarted.
Guardian
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.