Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27260: CWE-790 in Ericsson Indoor Connect 8855

0
High
VulnerabilityCVE-2025-27260cvecve-2025-27260cwe-790
Published: Wed Mar 25 2026 (03/25/2026, 12:54:46 UTC)
Source: CVE Database V5
Vendor/Project: Ericsson
Product: Indoor Connect 8855

Description

Ericsson Indoor Connect 8855 versions prior to 2025.Q3 contains an Improper Filtering of Special Elements vulnerability which, if exploited, can lead to unauthorized modification of certain information

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 13:46:31 UTC

Technical Analysis

CVE-2025-27260 is a vulnerability identified in Ericsson Indoor Connect 8855 devices, specifically in versions prior to 2025.Q3. The root cause is an improper filtering of special elements (CWE-790), which typically refers to insufficient validation or sanitization of input data containing special characters or elements that can alter the intended processing logic. This flaw allows an attacker with low privileges (PR:L) to perform unauthorized modifications to certain information on the device without requiring user interaction (UI:N). The CVSS 4.0 vector indicates the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), no authentication required (AT:N), and no user interaction needed. The impact primarily affects confidentiality and integrity (VI:H, VA:H), meaning sensitive data could be altered or leaked, potentially disrupting device operation or compromising network security. The vulnerability does not affect availability or scope beyond the component. Although no exploits are currently known in the wild and no official patches have been released, the vulnerability's nature suggests it could be leveraged for configuration tampering or data manipulation, which could cascade into broader network security issues. Ericsson Indoor Connect 8855 is used in indoor cellular coverage solutions, making this vulnerability relevant for enterprises and service providers relying on these devices for network extension and quality of service.

Potential Impact

The exploitation of CVE-2025-27260 could lead to unauthorized modification of critical configuration or operational data within Ericsson Indoor Connect 8855 devices. This can compromise the integrity and confidentiality of network communications, potentially allowing attackers to manipulate device behavior, intercept or alter data traffic, or degrade service quality. For organizations, this could mean disruption of indoor cellular coverage, exposure of sensitive operational parameters, and increased risk of lateral movement within the network. Given the device's role in telecom infrastructure, successful exploitation could impact enterprise networks, public venues, and service provider environments, leading to service outages or data breaches. The lack of required user interaction and the possibility of remote exploitation increase the threat level. While no active exploits are reported, the vulnerability's presence in widely deployed Ericsson equipment means that attackers could develop exploits, especially in regions with high Ericsson market penetration. This could affect telecom operators, large enterprises, and critical infrastructure sectors relying on indoor cellular coverage solutions.

Mitigation Recommendations

To mitigate CVE-2025-27260, organizations should immediately restrict network access to Ericsson Indoor Connect 8855 devices by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. Monitor device logs and configurations for unauthorized changes or anomalies indicative of exploitation attempts. Employ strong access controls and ensure that only trusted personnel have administrative privileges on these devices. Since no official patches are currently available, coordinate with Ericsson support for any interim firmware updates or recommended configuration changes. Consider deploying intrusion detection systems (IDS) tuned to detect suspicious activity targeting these devices. Additionally, plan for rapid deployment of vendor patches once released and conduct thorough vulnerability assessments on all affected devices. Regularly update asset inventories to identify all impacted units and prioritize remediation efforts accordingly. Finally, educate network administrators about this vulnerability and the importance of vigilant monitoring and access control.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ERIC
Date Reserved
2025-02-21T08:58:20.367Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c3e3c7f4197a8e3b4fe9b6

Added to database: 3/25/2026, 1:31:51 PM

Last enriched: 3/25/2026, 1:46:31 PM

Last updated: 3/26/2026, 5:25:37 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses