A malicious actor could perform a man-in-the-middle attack and intercept the communication between the Arc agent and the Guardian or CMC. This could result in theft of the client token and sensitive information (such as assets and alerts), impersonation of the server, or injection of spoofed data (such as false asset information or vulnerabilities) into the Guardian or CMC.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
Upgrade Arc to v2.2.0 or later.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://security.nozominetworks.com/NN-2025:18-01 |
|
Wed, 04 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The server certificate was not verified when an Arc agent connected to a Guardian or CMC. A malicious actor could perform a man-in-the-middle attack and intercept the communication between the Arc agent and the Guardian or CMC. This could result in theft of the client token and sensitive information (such as assets and alerts), impersonation of the server, or injection of spoofed data (such as false asset information or vulnerabilities) into the Guardian or CMC. | |
| Title | Lack of TLS certificate validation when connecting Arc to a Guardian or CMC, in Arc before v2.2.0 | |
| First Time appeared |
Nozomi Networks
Nozomi Networks arc |
|
| Weaknesses | CWE-295 | |
| CPEs | cpe:2.3:a:nozomi_networks:arc:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Nozomi Networks
Nozomi Networks arc |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2026-03-04T14:11:30.915Z
Reserved: 2025-04-16T09:04:35.922Z
Link: CVE-2025-40896
Updated: 2026-03-04T14:11:25.455Z
Status : Received
Published: 2026-03-04T14:16:14.143
Modified: 2026-03-04T14:16:14.143
Link: CVE-2025-40896
No data.
OpenCVE Enrichment
No data.