Description
Ericsson
Indoor Connect 8855 versions prior to 2025.Q3 contains an Improper Filtering of Special
Elements vulnerability which, if exploited, can lead to unauthorized
modification of certain information
Published: 2026-03-25
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized modification of certain information
Action: Immediate Patch
AI Analysis

Impact

An Improper Filtering of Special Elements vulnerability allows an attacker to supply specially crafted input that is not properly validated, resulting in unauthorized modification of certain information on the device. The flaw compromises data integrity by permitting changes to device configuration or other sensitive data, potentially altering device behavior. This weakness is categorized as CWE-790, which relates to improper evaluation of user-supplied data. The specific attack vector is not stated in the CVE description; it is inferred that an attacker could exploit the flaw by transmitting special inputs—such as through configuration files, network commands, or other interfaces—to the device.

Affected Systems

All Ericsson Indoor Connect 8855 devices running firmware revisions earlier than 2025.Q3 are affected. The vulnerability applies to all firmware versions prior to the 2025.Q3 release, encompassing hardware units that have not yet received the updated firmware. Devices in this scope should be identified and updated promptly.

Risk and Exploitability

The CVSS score of 7.2 indicates a moderate to high severity, and an EPSS score below 1% suggests a low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Exploitation would require an attacker to deliver special input to the device, a condition inferred from the description but not explicitly detailed. Given the severity and potential for unauthorized data modification, administrators should prioritize assessment and remediation.

Generated by OpenCVE AI on March 27, 2026 at 20:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Ericsson Indoor Connect 8855 firmware update to version 2025.Q3 or later on all affected devices.
  • Verify the firmware revision through the device management interface to confirm the update was applied correctly.
  • If an immediate update cannot be performed, isolate the device from external networks or restrict its access until the patch is applied.
  • After applying the patch, monitor device logs for any unexpected configuration changes to validate system integrity.

Generated by OpenCVE AI on March 27, 2026 at 20:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Ericsson indoor Connect 8855 Firmware
CPEs cpe:2.3:h:ericsson:indoor_connect_8855:-:*:*:*:*:*:*:*
cpe:2.3:o:ericsson:indoor_connect_8855_firmware:*:*:*:*:*:*:*:*
Vendors & Products Ericsson indoor Connect 8855 Firmware
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Ericsson
Ericsson indoor Connect 8855
Vendors & Products Ericsson
Ericsson indoor Connect 8855

Wed, 25 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
Description Ericsson Indoor Connect 8855 versions prior to 2025.Q3 contains an Improper Filtering of Special Elements vulnerability which, if exploited, can lead to unauthorized modification of certain information
Title Ericsson Indoor Connect 8855 - Improper Filtering of Special Elements Vulnerability
Weaknesses CWE-790
References
Metrics cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Ericsson Indoor Connect 8855 Indoor Connect 8855 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: ERIC

Published:

Updated: 2026-03-25T13:50:33.976Z

Reserved: 2025-02-21T08:58:20.367Z

Link: CVE-2025-27260

cve-icon Vulnrichment

Updated: 2026-03-25T13:50:30.293Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T14:16:30.100

Modified: 2026-03-27T18:33:18.243

Link: CVE-2025-27260

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-29T20:28:29Z

Weaknesses