Impact
A Cross‑Site Request Forgery flaw permits an attacker to cause an authenticated user to submit a forged request to the device, potentially altering configuration settings. This weakness is identified as CWE‑352 and compromises the integrity of the system; it does not lead to remote code execution or denial of service.
Affected Systems
Ericsson Indoor Connect 8855 devices running firmware versions released prior to the 2025.Q3 update are affected. All builds before that firmware release contain the flaw, regardless of specific build number. Users should consult the Ericsson PSIRT references to determine the firmware build on their device.
Risk and Exploitability
The CVSS score of 5.1 indicates moderate severity, while the EPSS score of less than 1 % suggests a low likelihood of exploitation at present. The vulnerability is not listed in CISA’s KEV catalog. The most likely attack vector involves an attacker tricking an authenticated user into visiting a malicious page or clicking a crafted link that, when rendered by the user’s browser, submits a forged request to the device. Based on the description, it is inferred that the attacker needs an authenticated session to succeed; no remote exploitation is described.
OpenCVE Enrichment