Browse all 25 CVE security advisories affecting Ericsson. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Ericsson operates as a global provider of telecommunications infrastructure, enabling mobile network connectivity and 5G deployment for service providers worldwide. Its extensive product portfolio, ranging from base stations to core network software, presents a broad attack surface that has historically attracted significant security scrutiny. Analysis of its vulnerability records reveals a prevalence of remote code execution and cross-site scripting flaws, often stemming from complex legacy codebases and embedded systems. While the company has faced notable incidents involving potential data exposure and configuration weaknesses, it generally maintains robust security protocols aligned with industry standards. The current count of twenty-five recorded CVEs reflects ongoing efforts to patch critical infrastructure components, though the scale of its global footprint necessitates continuous vigilance against sophisticated threats targeting critical communication networks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-53827 | Ericsson Packet Core Controller (PCC) - Improper Input Validation Vulnerability — Packet Core ControllerCWE-20 | 7.5 | High | 2025-05-16 |
| CVE-2024-25009 | Ericsson Packet Core Controller (PCC) - Improper Input Validation Vulnerability — Packet Core ControllerCWE-20 | 6.5 | Medium | 2024-08-20 |
This page lists every published CVE security advisory associated with Ericsson. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.