CVE-2025-27261
📋 TL;DR
Ericsson Indoor Connect 8855 contains an SQL injection vulnerability that allows attackers to execute arbitrary SQL commands on the database. This can lead to unauthorized data disclosure, modification, or deletion. Organizations using this Ericsson networking equipment are affected.
💻 Affected Systems
- Ericsson Indoor Connect 8855
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the database, including exfiltration of all sensitive data, modification of configuration settings, or denial of service by deleting critical data.
Likely Case
Unauthorized access to network configuration data, user information, or device logs stored in the database.
If Mitigated
Limited impact if network segmentation, database permissions, and input validation controls are properly implemented.
🎯 Exploit Status
SQL injection vulnerabilities typically have low exploitation complexity when unauthenticated access is available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific patched version
Vendor Advisory: https://www.ericsson.com/en/about-us/security/psirt/e2025-09-25
Restart Required: Yes
Instructions:
1. Review the Ericsson PSIRT advisory. 2. Download the patched firmware from Ericsson support. 3. Backup current configuration. 4. Apply firmware update following Ericsson documentation. 5. Verify the update was successful.
🔧 Temporary Workarounds
Network Segmentation
allIsolate the Ericsson Indoor Connect 8855 from untrusted networks and limit access to authorized management interfaces only.
Input Validation
allImplement web application firewall (WAF) rules to detect and block SQL injection patterns.
🧯 If You Can't Patch
- Implement strict network access controls to limit who can reach the management interface
- Monitor database and application logs for suspicious SQL queries
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against the patched version listed in the Ericsson advisory
Check Version:
Check via device web interface or CLI (specific command varies by Ericsson device)
Verify Fix Applied:
Verify the firmware version has been updated to the patched version and test SQL injection attempts are blocked
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL query patterns in database logs
- Multiple failed login attempts followed by SQL-like strings in requests
Network Indicators:
- HTTP requests containing SQL keywords (SELECT, UNION, INSERT, etc.) to the device management interface
SIEM Query:
source="ericsson_device" AND (http_request CONTAINS "SELECT" OR http_request CONTAINS "UNION" OR http_request CONTAINS "INSERT")