Nozominetworks
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Nozominetworks product.
RSS Feeds for Nozominetworks security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Nozominetworks products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Nozominetworks Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 3 vulnerabilities in Nozominetworks with an average score of 5.2 out of ten. Last year, in 2025 Nozominetworks had 5 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Nozominetworks in 2026 could surpass last years number. Last year, the average CVE base score was greater by 1.91
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 3 | 5.23 |
| 2025 | 5 | 7.14 |
| 2024 | 3 | 6.25 |
| 2023 | 11 | 6.85 |
| 2022 | 2 | 7.20 |
| 2021 | 2 | 6.05 |
It may take a day or so for new Nozominetworks vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Nozominetworks Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2025-40896 | Mar 04, 2026 |
Nozomi Arc Agent TLS Cert Validation Flaw Enabling MITMThe server certificate was not verified when an Arc agent connected to a Guardian or CMC. A malicious actor could perform a man-in-the-middle attack and intercept the communication between the Arc agent and the Guardian or CMC. This could result in theft of the client token and sensitive information (such as assets and alerts), impersonation of the server, or injection of spoofed data (such as false asset information or vulnerabilities) into the Guardian or CMC. |
|
| CVE-2025-40895 | Mar 04, 2026 |
Nozomi CMC Stored XSS via Sensor Map (Guardians)A Stored HTML Injection vulnerability was discovered in the CMC's Sensor Map functionality due to improper validation on connected Guardians' properties. A malicious authenticated user with administrator privileges on a Guardian connected to a CMC can edit the Guardian's properties to inject HTML tags. If the Sensor Map functionality is enabled in the CMC, when a victim CMC user interacts with it, then the injected HTML may render in their browser, enabling phishing and possibly open redirect attacks. Full XSS exploitation and direct information disclosure are prevented by the existing input validation and Content Security Policy configuration. |
|
| CVE-2025-40894 | Mar 04, 2026 |
Stored XSS in Nozomi Alerted Nodes DashboardA Stored HTML Injection vulnerability was discovered in the Alerted Nodes Dashboard functionality due to improper validation on an input parameter. A malicious authenticated user with the required privileges could edit a node label to inject HTML tags. If the system is configured to use the Alerted Nodes Dashboard, and alerts are reported for the affected node, then the injected HTML may render in the browser of a victim user interacting with it, enabling phishing and possibly open redirect attacks. Full XSS exploitation and direct information disclosure are prevented by the existing input validation and Content Security Policy configuration. |
|
| CVE-2025-40898 | Dec 18, 2025 |
Path Traversal in Arc Import Allows Authenticated File WriteA path traversal vulnerability was discovered in the Import Arc data archive functionality due to insufficient validation of the input file. An authenticated user with limited privileges, by uploading a specifically-crafted Arc data archive, can potentially write arbitrary files in arbitrary paths, altering the device configuration and/or affecting its availability. |
|
| CVE-2025-40893 | Dec 18, 2025 |
Stored HTML Injection in Asset List via Network PacketsA Stored HTML Injection vulnerability was discovered in the Asset List functionality due to improper validation of network traffic data. An unauthenticated attacker can send specially crafted network packets to inject HTML tags into asset attributes. When a victim views the affected assets in the Asset List (and similar functions), the injected HTML renders in their browser, enabling phishing and possibly open redirect attacks. Full XSS exploitation and direct information disclosure are prevented by the existing input validation and Content Security Policy configuration. |
|
| CVE-2025-40892 | Dec 18, 2025 |
Stored XSS in Reports of Unknown Web AppA Stored Cross-Site Scripting vulnerability was discovered in the Reports functionality due to improper validation of an input parameter. An authenticated user with report privileges can define a malicious report containing a JavaScript payload, or a victim can be socially engineered to import a malicious report template. When the victim views or imports the report, the XSS executes in their browser context, allowing the attacker to perform unauthorized actions as the victim, such as modify application data, disrupt application availability, and access limited sensitive information. |
|
| CVE-2025-40891 | Dec 18, 2025 |
Stored HTML Injection in Time Machine Snapshot Diff via Network Packet InjectionA Stored HTML Injection vulnerability was discovered in the Time Machine Snapshot Diff functionality due to improper validation of network traffic data. An unauthenticated attacker can send specially crafted network packets at two different times to inject HTML tags into asset attributes across two snapshots. Exploitation requires a victim to use the Time Machine Snapshot Diff feature on those specific snapshots and perform specific GUI actions, at which point the injected HTML renders in their browser, enabling phishing and open redirect attacks. Full XSS exploitation is prevented by input validation and Content Security Policy. Attack complexity is high due to multiple required conditions. |
|
| CVE-2025-40890 | Nov 25, 2025 |
Grafana Stored XSS in Dashboard (CVE-2025-40890)A Stored Cross-Site Scripting vulnerability was discovered in the Dashboards functionality due to improper validation of an input parameter. An authenticated low-privilege user can craft a malicious dashboard containing a JavaScript payload and share it with victim users, or a victim can be socially engineered to import a malicious dashboard template. When the victim views or imports the dashboard, the XSS executes in their browser context, allowing the attacker to perform unauthorized actions as the victim, such as modify application data, disrupt application availability, and access limited sensitive information. |
|
| CVE-2024-4465 | Sep 11, 2024 |
Access Control Bypass in Guardian/CMC Reports Lets Auth Users Alter SMTP SettingsAn access control vulnerability was discovered in the Reports section due to a specific access restriction not being properly enforced for users with limited privileges. If a logged-in user with reporting privileges learns how to create a specific application request, they might be able to make limited changes to the reporting configuration. This could result in a partial loss of data integrity. In Guardian/CMC instances with a reporting configuration, there could be limited Denial of Service (DoS) impacts, as the reports may not reach their intended destination, and there could also be limited information disclosure impacts. Furthermore, modifying the destination SMTP server for the reports could lead to the compromise of external credentials, as they might be sent to an unauthorized server. This could expand the scope of the attack. |
|
| CVE-2024-0218 | Apr 10, 2024 |
Nozomi Networks Guardian IDS DoS via malformed Radius packetsA Denial of Service (Dos) vulnerability in Nozomi Networks Guardian, caused by improper input validation in certain fields used in the Radius parsing functionality of our IDS, allows an unauthenticated attacker sending specially crafted malformed network packets to cause the IDS module to stop updating nodes, links, and assets. Network traffic may not be analyzed until the IDS module is restarted. |
|