Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
4.8
Arc Agent Fails to Verify Server Certificate, Allowing Man-in-the-Middle Attacks
CVE-2025-40896
Summary
Some Arc agents don't check the identity of servers they connect to, making it possible for a malicious actor to intercept sensitive information or impersonate the server. This could allow them to steal important data or inject false information. You should update your Arc agents to fix this issue.
Original title
The server certificate was not verified when an Arc agent connected to a Guardian or CMC.
A malicious actor could perform a man-in-the-middle attack and intercept the communication between the A...
Original description
The server certificate was not verified when an Arc agent connected to a Guardian or CMC.
A malicious actor could perform a man-in-the-middle attack and intercept the communication between the Arc agent and the Guardian or CMC. This could result in theft of the client token and sensitive information (such as assets and alerts), impersonation of the server, or injection of spoofed data (such as false asset information or vulnerabilities) into the Guardian or CMC.
A malicious actor could perform a man-in-the-middle attack and intercept the communication between the Arc agent and the Guardian or CMC. This could result in theft of the client token and sensitive information (such as assets and alerts), impersonation of the server, or injection of spoofed data (such as false asset information or vulnerabilities) into the Guardian or CMC.
osv CVSS3.1
4.8
- https://security.nozominetworks.com/NN-2025:18-01 Vendor Advisory
Published: 4 Mar 2026 · Updated: 13 Mar 2026 · First seen: 13 Mar 2026