Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27259: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Ericsson Ericsson Network Manager(ENM)

0
Low
VulnerabilityCVE-2025-27259cvecve-2025-27259cwe-79
Published: Mon Oct 13 2025 (10/13/2025, 06:16:37 UTC)
Source: CVE Database V5
Vendor/Project: Ericsson
Product: Ericsson Network Manager(ENM)

Description

Ericsson Network Manager versions prior to ENM 25.2 GA contain a vulnerability that, if exploited, can exfiltrate limited data or redirect victims to other sites or domains.

AI-Powered Analysis

AILast updated: 10/13/2025, 06:48:26 UTC

Technical Analysis

CVE-2025-27259 is a Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting Ericsson Network Manager (ENM) versions prior to 25.2 GA. The flaw stems from improper neutralization of user-supplied input during the generation of web pages, which allows an attacker with low privileges to inject malicious scripts into the ENM web interface. Successful exploitation requires user interaction, such as clicking a crafted link or visiting a malicious page, and can result in limited data exfiltration or redirecting victims to attacker-controlled domains. The vulnerability has a CVSS 4.0 score of 2.4, reflecting low impact due to the limited scope of data exposure, the need for user interaction, and the requirement for low-level privileges. No public exploits or active exploitation campaigns have been reported to date. ENM is a critical network management tool widely used by telecom operators and enterprises to monitor and manage network infrastructure. The vulnerability could be leveraged in targeted phishing campaigns or internal attacks to gain limited information or redirect users, potentially facilitating further attacks or social engineering. The lack of a patch link suggests that remediation is expected in ENM 25.2 GA or later versions. Given the nature of the vulnerability, it primarily affects the confidentiality and integrity of data displayed or processed via the ENM web interface, with no direct impact on availability.

Potential Impact

For European organizations, especially telecom operators and enterprises relying on Ericsson Network Manager, this vulnerability poses a risk of limited data leakage and user redirection to malicious sites. Although the impact is low, attackers could exploit this XSS flaw to conduct targeted phishing or social engineering attacks, potentially compromising user credentials or facilitating lateral movement within the network. The vulnerability could undermine trust in network management interfaces and expose sensitive operational data if exploited internally. Given the critical role of ENM in managing network infrastructure, even limited exploitation could disrupt operational security and compliance with data protection regulations such as GDPR. Organizations with exposed or poorly segmented ENM web interfaces are at higher risk. The low CVSS score indicates that the threat is not severe but should not be ignored, as attackers often chain low-severity vulnerabilities to achieve more significant compromises.

Mitigation Recommendations

1. Upgrade Ericsson Network Manager to version 25.2 GA or later, where the vulnerability is addressed. 2. Implement strict input validation and output encoding on all user-supplied data within the ENM web interface to prevent script injection. 3. Restrict access to the ENM web interface using network segmentation, VPNs, or IP whitelisting to limit exposure to trusted users only. 4. Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks by restricting script execution sources. 5. Conduct regular security assessments and penetration testing focused on web application vulnerabilities in ENM deployments. 6. Educate users and administrators about phishing risks and the importance of cautious interaction with links or content related to ENM. 7. Monitor logs and network traffic for unusual redirection patterns or suspicious activity indicative of exploitation attempts. 8. Coordinate with Ericsson support for any available patches or workarounds and stay informed about security advisories related to ENM.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ERIC
Date Reserved
2025-02-21T08:58:20.367Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ec9d40a7330cdb49adeaf1

Added to database: 10/13/2025, 6:33:36 AM

Last enriched: 10/13/2025, 6:48:26 AM

Last updated: 10/13/2025, 7:45:22 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats