Description
Ericsson Indoor Connect 8855 versions prior to 2025.Q3 contains a
Cross-Site Scripting (XSS) vulnerability which, if exploited, can lead to
unauthorized disclosure and modification of certain information.
Published: 2026-03-25
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting that permits unauthorized disclosure and modification of information
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an improper neutralization of input during web page generation in Ericsson Indoor Connect 8855 versions released before 2025.Q3. It allows an attacker to inject malicious scripts into pages served by the device, enabling theft or alteration of data visible to a web‑browser user. This client‑side input sanitization flaw is a classic Reflected Cross‑Site Scripting weakness (CWE‑79).

Affected Systems

All units of Ericsson Indoor Connect 8855 that run firmware dated prior to the 2025.Q3 release are impacted. This includes the hardware platform that hosts the indoor positioning software as well as the firmware that provides the web interface for configuration and monitoring.

Risk and Exploitability

The flaw scores a high CVSS score of 8.5, yet the EPSS score is below 1 %, indicating that while the potential impact is severe, current exploitation risk is low. It is not listed in the CISA KEV catalog. Based on the description, it is inferred that the likely attack vector is an attacker crafting a malicious URL or payload that is passed through the device’s web interface, which a victim’s browser then renders. Such an attack would require an authenticated or unauthenticated user to view the affected web page but no further system compromise is required.

Generated by OpenCVE AI on March 27, 2026 at 19:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the device to Ericsson Indoor Connect 8855 firmware version 2025.Q3 or later following Ericsson’s PSIRT advisory instructions.
  • Verify the firmware version after the update and reboot the device to apply the change.
  • If an update is not immediately available, isolate the web interface to a trusted network segment or restrict access to the device’s management port.
  • Restrict or disable any user‑controlled input fields that are not essential for operation to reduce exposure to script injection.
  • Monitor user activity for anomalous script execution and consult Ericsson’s security bulletin for additional configuration guidance.

Generated by OpenCVE AI on March 27, 2026 at 19:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Ericsson indoor Connect 8855 Firmware
CPEs cpe:2.3:h:ericsson:indoor_connect_8855:-:*:*:*:*:*:*:*
cpe:2.3:o:ericsson:indoor_connect_8855_firmware:*:*:*:*:*:*:*:*
Vendors & Products Ericsson indoor Connect 8855 Firmware
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Ericsson
Ericsson indoor Connect 8855
Vendors & Products Ericsson
Ericsson indoor Connect 8855

Wed, 25 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
Description Ericsson Indoor Connect 8855 versions prior to 2025.Q3 contains a Cross-Site Scripting (XSS) vulnerability which, if exploited, can lead to unauthorized disclosure and modification of certain information.
Title Ericsson Indoor Connect 8855 - Improper Neutralization of Input During Web Page Generation Vulnerability
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Ericsson Indoor Connect 8855 Indoor Connect 8855 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: ERIC

Published:

Updated: 2026-03-25T13:44:10.955Z

Reserved: 2025-04-16T08:59:01.744Z

Link: CVE-2025-40842

cve-icon Vulnrichment

Updated: 2026-03-25T13:44:06.794Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T14:16:30.570

Modified: 2026-03-27T18:27:30.370

Link: CVE-2025-40842

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T20:26:35Z

Weaknesses