CVE-2025-40836
Published: 25 September 2025
Summary
CVE-2025-40836 is a critical-severity Improper Input Validation (CWE-20) vulnerability in Ericsson Indoor Connect 8855 Firmware. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 36.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly enforces proper input validation mechanisms at system interfaces, preventing exploitation of the improper input validation vulnerability (CWE-20).
SI-2 requires timely identification, reporting, and correction of flaws like this CVE, mitigating it through patching as recommended by the vendor.
AC-6 enforces least privilege, limiting the impact of arbitrary command execution even if input validation fails and privileges are escalated.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Improper input validation on a network-exposed device enables unauthenticated remote arbitrary command execution with privilege escalation, directly mapping to T1190 (public-facing app exploitation) and T1068 (priv esc via exploitation).
NVD Description
Ericsson Indoor Connect 8855 contains an improper input validation vulnerability which if exploited can allow an attacker to execute commands with escalated privileges.
Deeper analysisAI
CVE-2025-40836 is an improper input validation vulnerability (CWE-20) in Ericsson Indoor Connect 8855. Published on 2025-09-25, the issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting its critical severity due to the potential for remote exploitation with high impacts on confidentiality, integrity, and availability.
An unauthenticated attacker with network access to the affected device can exploit this vulnerability through a low-complexity attack requiring no user interaction. Successful exploitation allows the attacker to execute arbitrary commands with escalated privileges on the device.
Ericsson's PSIRT advisory at https://www.ericsson.com/en/about-us/security/psirt/e2025-09-25 provides further details on the vulnerability and recommended mitigations.
Details
- CWE(s)