CVE-2025-27259: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Ericsson Ericsson Network Manager(ENM)
Ericsson Network Manager versions prior to ENM 25.2 GA contain a vulnerability that, if exploited, can exfiltrate limited data or redirect victims to other sites or domains.
AI Analysis
Technical Summary
CVE-2025-27259 is a Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting Ericsson Network Manager (ENM) versions prior to 25.2 GA. The flaw stems from improper neutralization of user-supplied input during the generation of web pages, which allows an attacker with low privileges to inject malicious scripts into the ENM web interface. Successful exploitation requires user interaction, such as clicking a crafted link or visiting a malicious page, and can result in limited data exfiltration or redirecting victims to attacker-controlled domains. The vulnerability has a CVSS 4.0 score of 2.4, reflecting low impact due to the limited scope of data exposure, the need for user interaction, and the requirement for low-level privileges. No public exploits or active exploitation campaigns have been reported to date. ENM is a critical network management tool widely used by telecom operators and enterprises to monitor and manage network infrastructure. The vulnerability could be leveraged in targeted phishing campaigns or internal attacks to gain limited information or redirect users, potentially facilitating further attacks or social engineering. The lack of a patch link suggests that remediation is expected in ENM 25.2 GA or later versions. Given the nature of the vulnerability, it primarily affects the confidentiality and integrity of data displayed or processed via the ENM web interface, with no direct impact on availability.
Potential Impact
For European organizations, especially telecom operators and enterprises relying on Ericsson Network Manager, this vulnerability poses a risk of limited data leakage and user redirection to malicious sites. Although the impact is low, attackers could exploit this XSS flaw to conduct targeted phishing or social engineering attacks, potentially compromising user credentials or facilitating lateral movement within the network. The vulnerability could undermine trust in network management interfaces and expose sensitive operational data if exploited internally. Given the critical role of ENM in managing network infrastructure, even limited exploitation could disrupt operational security and compliance with data protection regulations such as GDPR. Organizations with exposed or poorly segmented ENM web interfaces are at higher risk. The low CVSS score indicates that the threat is not severe but should not be ignored, as attackers often chain low-severity vulnerabilities to achieve more significant compromises.
Mitigation Recommendations
1. Upgrade Ericsson Network Manager to version 25.2 GA or later, where the vulnerability is addressed. 2. Implement strict input validation and output encoding on all user-supplied data within the ENM web interface to prevent script injection. 3. Restrict access to the ENM web interface using network segmentation, VPNs, or IP whitelisting to limit exposure to trusted users only. 4. Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks by restricting script execution sources. 5. Conduct regular security assessments and penetration testing focused on web application vulnerabilities in ENM deployments. 6. Educate users and administrators about phishing risks and the importance of cautious interaction with links or content related to ENM. 7. Monitor logs and network traffic for unusual redirection patterns or suspicious activity indicative of exploitation attempts. 8. Coordinate with Ericsson support for any available patches or workarounds and stay informed about security advisories related to ENM.
Affected Countries
Sweden, Germany, United Kingdom, France, Italy, Netherlands, Spain
CVE-2025-27259: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Ericsson Ericsson Network Manager(ENM)
Description
Ericsson Network Manager versions prior to ENM 25.2 GA contain a vulnerability that, if exploited, can exfiltrate limited data or redirect victims to other sites or domains.
AI-Powered Analysis
Technical Analysis
CVE-2025-27259 is a Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting Ericsson Network Manager (ENM) versions prior to 25.2 GA. The flaw stems from improper neutralization of user-supplied input during the generation of web pages, which allows an attacker with low privileges to inject malicious scripts into the ENM web interface. Successful exploitation requires user interaction, such as clicking a crafted link or visiting a malicious page, and can result in limited data exfiltration or redirecting victims to attacker-controlled domains. The vulnerability has a CVSS 4.0 score of 2.4, reflecting low impact due to the limited scope of data exposure, the need for user interaction, and the requirement for low-level privileges. No public exploits or active exploitation campaigns have been reported to date. ENM is a critical network management tool widely used by telecom operators and enterprises to monitor and manage network infrastructure. The vulnerability could be leveraged in targeted phishing campaigns or internal attacks to gain limited information or redirect users, potentially facilitating further attacks or social engineering. The lack of a patch link suggests that remediation is expected in ENM 25.2 GA or later versions. Given the nature of the vulnerability, it primarily affects the confidentiality and integrity of data displayed or processed via the ENM web interface, with no direct impact on availability.
Potential Impact
For European organizations, especially telecom operators and enterprises relying on Ericsson Network Manager, this vulnerability poses a risk of limited data leakage and user redirection to malicious sites. Although the impact is low, attackers could exploit this XSS flaw to conduct targeted phishing or social engineering attacks, potentially compromising user credentials or facilitating lateral movement within the network. The vulnerability could undermine trust in network management interfaces and expose sensitive operational data if exploited internally. Given the critical role of ENM in managing network infrastructure, even limited exploitation could disrupt operational security and compliance with data protection regulations such as GDPR. Organizations with exposed or poorly segmented ENM web interfaces are at higher risk. The low CVSS score indicates that the threat is not severe but should not be ignored, as attackers often chain low-severity vulnerabilities to achieve more significant compromises.
Mitigation Recommendations
1. Upgrade Ericsson Network Manager to version 25.2 GA or later, where the vulnerability is addressed. 2. Implement strict input validation and output encoding on all user-supplied data within the ENM web interface to prevent script injection. 3. Restrict access to the ENM web interface using network segmentation, VPNs, or IP whitelisting to limit exposure to trusted users only. 4. Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks by restricting script execution sources. 5. Conduct regular security assessments and penetration testing focused on web application vulnerabilities in ENM deployments. 6. Educate users and administrators about phishing risks and the importance of cautious interaction with links or content related to ENM. 7. Monitor logs and network traffic for unusual redirection patterns or suspicious activity indicative of exploitation attempts. 8. Coordinate with Ericsson support for any available patches or workarounds and stay informed about security advisories related to ENM.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ERIC
- Date Reserved
- 2025-02-21T08:58:20.367Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ec9d40a7330cdb49adeaf1
Added to database: 10/13/2025, 6:33:36 AM
Last enriched: 10/13/2025, 6:48:26 AM
Last updated: 10/13/2025, 7:45:22 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11666: Use of Hard-coded Password in Tenda RP3 Pro
HighCVE-2025-9265: CWE-346 Origin Validation Error in Kiloview NDI
CriticalCVE-2025-8915: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Kiloview N30
HighCVE-2025-11665: OS Command Injection in D-Link DAP-2695
MediumCVE-2025-27258: CWE-284: Improper Access Control in Ericsson Ericsson Network Manager(ENM)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.