Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27259: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Ericsson Ericsson Network Manager(ENM)

0
Low
VulnerabilityCVE-2025-27259cvecve-2025-27259cwe-79
Published: Mon Oct 13 2025 (10/13/2025, 06:16:37 UTC)
Source: CVE Database V5
Vendor/Project: Ericsson
Product: Ericsson Network Manager(ENM)

Description

Ericsson Network Manager versions prior to ENM 25.2 GA contain a vulnerability that, if exploited, can exfiltrate limited data or redirect victims to other sites or domains.

AI-Powered Analysis

AILast updated: 10/21/2025, 00:36:34 UTC

Technical Analysis

CVE-2025-27259 is a Cross-site Scripting (XSS) vulnerability classified under CWE-79 that affects Ericsson Network Manager (ENM) versions prior to 25.2 GA. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages within the ENM interface. This flaw allows an attacker with low privileges (PR:L) and requiring user interaction (UI:A) to inject malicious scripts that execute in the context of the victim’s browser session. The impact includes limited data exfiltration and the ability to redirect users to arbitrary external sites or domains, potentially facilitating phishing or further attacks. The CVSS 4.0 vector indicates the attack requires adjacent network access (AV:A), low attack complexity (AC:L), no authentication bypass (AT:N), and low impact on confidentiality and integrity, with no impact on availability. No known exploits have been reported in the wild, and no official patches have been released as of the publication date. The vulnerability primarily affects web-based management consoles, which are critical for network operations and monitoring. Given the nature of XSS, exploitation depends on tricking users into interacting with crafted links or content, making social engineering a likely component of attacks. The vulnerability's limited scope and low severity reduce immediate risk but do not eliminate the potential for targeted exploitation, especially in environments where ENM is widely deployed.

Potential Impact

For European organizations, especially telecom operators and enterprises relying on Ericsson Network Manager for network orchestration and monitoring, this vulnerability poses a risk of limited data leakage and user redirection attacks. While the direct impact on confidentiality, integrity, and availability is low, successful exploitation could facilitate phishing campaigns or lateral movement by attackers leveraging redirected users or stolen session data. The vulnerability could undermine trust in network management interfaces and potentially expose sensitive operational data if combined with other attack vectors. Given the critical role of ENM in managing telecommunications infrastructure, even low-severity vulnerabilities warrant attention to prevent escalation. Organizations with remote or adjacent network access to ENM interfaces are particularly at risk, as the attack vector requires proximity. The low CVSS score reflects limited immediate damage, but the potential for chained attacks or social engineering increases the threat landscape. Operational disruptions are unlikely directly from this vulnerability but could arise indirectly from successful exploitation.

Mitigation Recommendations

To mitigate CVE-2025-27259, European organizations should prioritize the following actions: 1) Monitor Ericsson’s official channels for patches or updates addressing this vulnerability and apply them promptly once available. 2) Restrict access to the ENM web interface to trusted networks and users, minimizing exposure to adjacent network attackers. 3) Enforce the principle of least privilege by limiting user permissions within ENM to reduce the impact of compromised accounts. 4) Implement robust input validation and output encoding on all user-supplied data in custom integrations or extensions to ENM, if applicable. 5) Deploy Content Security Policy (CSP) headers to mitigate the impact of injected scripts by restricting script sources. 6) Educate users about phishing and social engineering risks, as exploitation requires user interaction. 7) Conduct regular security assessments and penetration testing focused on web interfaces to detect similar vulnerabilities. 8) Use network segmentation and firewall rules to isolate management interfaces from general user networks. These targeted measures go beyond generic advice and address the specific attack vectors and operational context of ENM deployments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ERIC
Date Reserved
2025-02-21T08:58:20.367Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ec9d40a7330cdb49adeaf1

Added to database: 10/13/2025, 6:33:36 AM

Last enriched: 10/21/2025, 12:36:34 AM

Last updated: 12/3/2025, 7:53:27 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats