All the vulnerabilites related to Ericsson - Indoor Connect 8855
cve-2025-27262
Vulnerability from cvelistv5
Published
2025-09-25 14:43
Modified
2025-09-30 12:13
Severity ?
EPSS score ?
Summary
Ericsson Indoor Connect 8855 - Improper Neutralization of Special Elements used in an OS Command Vulnerability
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ericsson | Indoor Connect 8855 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27262", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-25T15:18:14.273331Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-25T15:27:05.382Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Indoor Connect 8855", "vendor": "Ericsson", "versions": [ { "changes": [ { "at": "2025.Q2", "status": "unaffected" } ], "lessThan": "2025.Q2", "status": "affected", "version": "0", "versionType": "Indoor Connect 8855" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Telstra" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eEricsson Indoor Connect 8855 contains a command injection vulnerability which if exploited can result in an escalation of privileges.\u003c/span\u003e" } ], "value": "Ericsson Indoor Connect 8855 contains a command injection vulnerability which if exploited can result in an escalation of privileges." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 8.5, "baseSeverity": "HIGH", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-30T12:13:16.746Z", "orgId": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf", "shortName": "ERIC" }, "references": [ { "url": "https://www.ericsson.com/en/about-us/security/psirt/e2025-09-25" } ], "source": { "discovery": "UNKNOWN" }, "title": "Ericsson Indoor Connect 8855 - Improper Neutralization of Special Elements used in an OS Command Vulnerability", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf", "assignerShortName": "ERIC", "cveId": "CVE-2025-27262", "datePublished": "2025-09-25T14:43:29.803Z", "dateReserved": "2025-02-21T08:58:20.367Z", "dateUpdated": "2025-09-30T12:13:16.746Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-40837
Vulnerability from cvelistv5
Published
2025-09-25 14:52
Modified
2025-09-30 12:15
Severity ?
EPSS score ?
Summary
Ericsson Indoor Connect 8855 - Missing Authorization Vulnerability
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ericsson | Indoor Connect 8855 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-40837", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-25T15:44:22.046103Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-25T15:48:15.172Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Indoor Connect 8855", "vendor": "Ericsson", "versions": [ { "changes": [ { "at": "2025.Q2", "status": "unaffected" } ], "lessThan": "2025.Q2", "status": "affected", "version": "0", "versionType": "Indoor Connect 8855" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Telstra" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eEricsson Indoor Connect 8855 contains a missing authorization vulnerability which if exploited can allow access to the system as a user with higher privileges than intended.\u003c/span\u003e" } ], "value": "Ericsson Indoor Connect 8855 contains a missing authorization vulnerability which if exploited can allow access to the system as a user with higher privileges than intended." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-30T12:15:13.648Z", "orgId": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf", "shortName": "ERIC" }, "references": [ { "url": "https://www.ericsson.com/en/about-us/security/psirt/e2025-09-25" } ], "source": { "discovery": "UNKNOWN" }, "title": "Ericsson Indoor Connect 8855 - Missing Authorization Vulnerability", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf", "assignerShortName": "ERIC", "cveId": "CVE-2025-40837", "datePublished": "2025-09-25T14:52:23.376Z", "dateReserved": "2025-04-16T08:59:01.744Z", "dateUpdated": "2025-09-30T12:15:13.648Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-27261
Vulnerability from cvelistv5
Published
2025-09-25 13:47
Modified
2025-09-30 12:12
Severity ?
EPSS score ?
Summary
Ericsson Indoor Connect 8855 - Improper Neutralization of Special Elements used in an SQL Command Vulnerability
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ericsson | Indoor Connect 8855 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27261", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-25T14:30:26.479892Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-25T14:30:40.991Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Indoor Connect 8855", "vendor": "Ericsson", "versions": [ { "changes": [ { "at": "2025.Q2", "status": "unaffected" } ], "lessThan": "2025.Q2", "status": "affected", "version": "0", "versionType": "Indoor Connect 8855" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Telstra" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eEricsson Indoor Connect 8855 contains an SQL injection vulnerability which if exploited can result in unauthorized disclosure or modification of data.\u003c/span\u003e" } ], "value": "Ericsson Indoor Connect 8855 contains an SQL injection vulnerability which if exploited can result in unauthorized disclosure or modification of data." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-30T12:12:39.842Z", "orgId": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf", "shortName": "ERIC" }, "references": [ { "url": "https://www.ericsson.com/en/about-us/security/psirt/e2025-09-25" } ], "source": { "discovery": "UNKNOWN" }, "title": "Ericsson Indoor Connect 8855 - Improper Neutralization of Special Elements used in an SQL Command Vulnerability", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf", "assignerShortName": "ERIC", "cveId": "CVE-2025-27261", "datePublished": "2025-09-25T13:47:06.233Z", "dateReserved": "2025-02-21T08:58:20.367Z", "dateUpdated": "2025-09-30T12:12:39.842Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-40838
Vulnerability from cvelistv5
Published
2025-09-25 14:54
Modified
2025-09-30 12:15
Severity ?
EPSS score ?
Summary
Ericsson Indoor Connect 8855 - Insufficiently Protected Credentials Vulnerability
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ericsson | Indoor Connect 8855 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-40838", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-25T15:44:16.433331Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-25T15:48:09.737Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Indoor Connect 8855", "vendor": "Ericsson", "versions": [ { "changes": [ { "at": "2025.Q2", "status": "unaffected" } ], "lessThan": "2025.Q2", "status": "affected", "version": "0", "versionType": "Indoor Connect 8855" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Telstra" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eEricsson Indoor Connect 8855 contains a vulnerability where server-side security can be bypassed in the client which if exploited can lead to unauthorized disclosure of certain information.\u003c/span\u003e" } ], "value": "Ericsson Indoor Connect 8855 contains a vulnerability where server-side security can be bypassed in the client which if exploited can lead to unauthorized disclosure of certain information." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.1, "baseSeverity": "MEDIUM", "privilegesRequired": "HIGH", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522 Insufficiently Protected Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-30T12:15:44.492Z", "orgId": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf", "shortName": "ERIC" }, "references": [ { "url": "https://www.ericsson.com/en/about-us/security/psirt/e2025-09-25" } ], "source": { "discovery": "UNKNOWN" }, "title": "Ericsson Indoor Connect 8855 - Insufficiently Protected Credentials Vulnerability", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf", "assignerShortName": "ERIC", "cveId": "CVE-2025-40838", "datePublished": "2025-09-25T14:54:43.229Z", "dateReserved": "2025-04-16T08:59:01.744Z", "dateUpdated": "2025-09-30T12:15:44.492Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-40836
Vulnerability from cvelistv5
Published
2025-09-25 14:49
Modified
2025-09-30 12:14
Severity ?
EPSS score ?
Summary
Ericsson Indoor Connect 8855 - Improper Input Validation Vulnerability
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ericsson | Indoor Connect 8855 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-40836", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-25T15:44:35.263809Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-25T15:48:27.041Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Indoor Connect 8855", "vendor": "Ericsson", "versions": [ { "changes": [ { "at": "2025.Q2", "status": "unaffected" } ], "lessThan": "2025.Q2", "status": "affected", "version": "0", "versionType": "Indoor Connect 8855" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Telstra" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eEricsson Indoor Connect 8855 contains an improper input validation vulnerability which if exploited can allow an attacker to execute commands with escalated privileges.\u003c/span\u003e" } ], "value": "Ericsson Indoor Connect 8855 contains an improper input validation vulnerability which if exploited can allow an attacker to execute commands with escalated privileges." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-30T12:14:36.904Z", "orgId": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf", "shortName": "ERIC" }, "references": [ { "url": "https://www.ericsson.com/en/about-us/security/psirt/e2025-09-25" } ], "source": { "discovery": "UNKNOWN" }, "title": "Ericsson Indoor Connect 8855 - Improper Input Validation Vulnerability", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "85b1779b-6ecd-4f52-bcc5-73eac4659dcf", "assignerShortName": "ERIC", "cveId": "CVE-2025-40836", "datePublished": "2025-09-25T14:49:02.613Z", "dateReserved": "2025-04-16T08:59:01.744Z", "dateUpdated": "2025-09-30T12:14:36.904Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }