Skip navigation

Security Bulletin – Ericsson Indoor Connect 8855, March, 2026

Summary:

Ericsson has released the Indoor Connect 2025.Q3 update which addresses 3 security vulnerabilities found in Ericsson Indoor Connect 8855.

Vulnerability description:

CVE-2025-27260: Ericsson Indoor Connect 8855 versions prior to 2025.Q3 contains an Improper Filtering of Special Elements vulnerability which, if exploited, can lead to unauthorized modification of certain information.

CVSS Base Score: 7.2
Severity: High
CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
Weakness Type: CWE-790: Improper Filtering of Special Elements
 
CVE-2025-40841: Ericsson Indoor Connect 8855 versions prior to 2025.Q3 contains a Cross-Site Request Forgery (CSRF) vulnerability which, if exploited, can lead to unauthorized modification of certain information.

CVSS Base Score: 5.1
Severity: Medium
CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
Weakness Type: CWE-352: Cross-Site Request Forgery (CSRF)

CVE-2025-40842: Ericsson Indoor Connect 8855 versions prior to 2025.Q3 contains a Cross-Site Scripting (XSS) vulnerability which, if exploited, can lead to unauthorized disclosure and modification of certain information. 
 
CVSS Base Score: 8.5
Severity: High
CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N 
Weakness Type: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Security update:

The following table lists the Ericsson products affected, versions affected, and the updated version that includes this security update.

To protect your system, download and install the updated version.

CVE Addressed Product Name Affected Versions Updated Versions
CVE-2025-27260
CVE-2025-40841
CVE-2025-40842
Indoor Connect 8855 All versions prior to 2025.Q3 2025.Q3

Acknowledgement:

Ericsson thanks following people/organization for reporting these issues to us:
Telstra

Additional information:

  • Ericsson severity assessment of a vulnerability is based on an average of risk across a diverse set of installed systems and may not represent the true risk to your organization. We recommend evaluating the risk to your specific configuration.
  • If you have any questions regarding this bulletin, please reach out to your local Ericsson support representative, for more information see our Customer Support page.
  • Learn more about the vulnerability management process followed by the Ericsson Product Security Incident Response Team (PSIRT), see Ericsson PSIRT page.

Revision history:

Revision Date Description
1.0 March 25, 2026 Initial Release

© Ericsson AB 2026. All rights reserved. No part of this message may be reproduced in any form without the written permission of the copyright owner. The contents of this document are subject to revision without notice due to continued progress in methodology, design and manufacturing. Ericsson shall have no liability for any error or damage of any kind resulting from the use of this message. For questions, please contact Ericsson Local Support or connect with us on the Omni Network Channel section of My Ericsson. Visit us at Support User Preferences to unsubscribe.