Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-40837: CWE-862 Missing Authorization in Ericsson Indoor Connect 8855

0
High
VulnerabilityCVE-2025-40837cvecve-2025-40837cwe-862
Published: Thu Sep 25 2025 (09/25/2025, 14:52:23 UTC)
Source: CVE Database V5
Vendor/Project: Ericsson
Product: Indoor Connect 8855

Description

Ericsson Indoor Connect 8855 contains a missing authorization vulnerability which if exploited can allow access to the system as a user with higher privileges than intended.

AI-Powered Analysis

AILast updated: 10/03/2025, 00:26:43 UTC

Technical Analysis

CVE-2025-40837 is a high-severity vulnerability identified in the Ericsson Indoor Connect 8855 product, classified under CWE-862, which denotes a Missing Authorization weakness. This vulnerability arises when the system fails to properly enforce authorization checks, allowing an attacker to gain access to functionalities or data with higher privileges than intended. Specifically, an attacker exploiting this flaw can escalate their privileges within the system without proper authentication or authorization barriers. The CVSS 4.0 base score of 8.7 reflects the critical nature of this vulnerability, highlighting that it is remotely exploitable (AV:N), requires low attack complexity (AC:L), does not require authentication (AT:N), and does not require user interaction (UI:N). The impact on confidentiality, integrity, and availability is rated as high (VC:H, VI:H, VA:H), indicating that successful exploitation could lead to significant unauthorized disclosure, modification, or disruption of system operations. The vulnerability affects the Ericsson Indoor Connect 8855, a product designed to enhance indoor cellular connectivity, typically deployed in enterprise or large building environments to improve mobile network coverage. No patches or known exploits in the wild have been reported as of the publication date, but the absence of a patch increases the urgency for mitigation. The lack of authentication requirement and the ability to escalate privileges remotely make this vulnerability particularly dangerous, as attackers can leverage it to gain control over the device, potentially pivoting to other network segments or intercepting sensitive communications. Given the strategic role of Indoor Connect 8855 in telecommunications infrastructure, exploitation could disrupt critical communication services or compromise enterprise network security.

Potential Impact

For European organizations, the impact of CVE-2025-40837 could be substantial. Ericsson is a major telecommunications vendor with a significant presence across Europe, and many enterprises and service providers deploy Indoor Connect 8855 units to ensure reliable indoor cellular coverage. Exploitation of this vulnerability could allow attackers to gain unauthorized elevated access to these devices, potentially leading to interception or manipulation of voice and data traffic, disruption of communication services, and unauthorized lateral movement within corporate or service provider networks. This could affect sectors reliant on secure and continuous communications, such as finance, healthcare, government, and critical infrastructure. Additionally, the compromise of these devices could facilitate espionage or sabotage activities, especially in sensitive environments. The high severity and ease of exploitation increase the risk of targeted attacks or opportunistic exploitation by cybercriminals or state-sponsored actors. The absence of known exploits currently provides a window for proactive defense, but the situation could rapidly evolve if exploit code becomes publicly available.

Mitigation Recommendations

Given the lack of an official patch at the time of disclosure, European organizations should implement immediate compensating controls. These include restricting network access to Indoor Connect 8855 devices by implementing strict firewall rules and network segmentation to isolate these devices from untrusted or less secure network zones. Employing strong access control policies and monitoring administrative access attempts can help detect and prevent unauthorized privilege escalation. Organizations should also conduct thorough audits of device configurations and logs to identify any suspicious activity. Where possible, disable unnecessary services or interfaces on the affected devices to reduce the attack surface. Ericsson customers should maintain close communication with the vendor for timely updates and patches. Once a patch is released, prompt testing and deployment are critical. Additionally, organizations should incorporate these devices into their vulnerability management and incident response plans, ensuring readiness to respond to potential exploitation attempts. Regular security awareness training for network administrators managing these devices is also recommended to recognize and mitigate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ERIC
Date Reserved
2025-04-16T08:59:01.744Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d558e1bbd73d20e5f4081e

Added to database: 9/25/2025, 2:59:45 PM

Last enriched: 10/3/2025, 12:26:43 AM

Last updated: 10/7/2025, 1:41:23 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats