Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10847: Vulnerability in Broadcom Unified Infrastructure Management

0
High
VulnerabilityCVE-2025-10847cvecve-2025-10847
Published: Wed Oct 01 2025 (10/01/2025, 10:48:12 UTC)
Source: CVE Database V5
Vendor/Project: Broadcom
Product: Unified Infrastructure Management

Description

DX Unified Infrastructure Management (Nimsoft/UIM) and below contains an improper ACL handling vulnerability in the robot (controller) component. A remote attacker can execute commands, read from, or write to the target system.

AI-Powered Analysis

AILast updated: 10/08/2025, 11:01:23 UTC

Technical Analysis

CVE-2025-10847 is a vulnerability identified in Broadcom's Unified Infrastructure Management (UIM) product, version 23.4.5 and earlier. The issue stems from improper Access Control List (ACL) handling within the robot (controller) component, a critical part of the UIM architecture responsible for executing monitoring tasks and commands. This flaw allows a remote attacker to execute arbitrary commands and perform unauthorized read and write operations on the target system. The vulnerability does not require prior authentication or user interaction, increasing its risk profile. However, the attack complexity is high, and partial authentication is needed, which somewhat limits exploitation ease. The vulnerability affects confidentiality, integrity, and availability by enabling unauthorized command execution and data manipulation. The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), partial authentication (AT:P), no privileges required (PR:N), no user interaction (UI:N), and high impact on integrity and availability. No public exploits are known at this time, but the potential for severe impact on enterprise infrastructure monitoring systems is significant. The vulnerability is categorized under CWE-284, indicating improper access control. Broadcom has not yet released patches, so mitigation currently relies on network-level controls and monitoring. The robot component should be isolated from untrusted networks, and access should be tightly controlled. Organizations should monitor for unusual command execution patterns and unauthorized file access attempts. Given the critical role of UIM in enterprise IT operations, exploitation could disrupt monitoring and management functions, leading to operational downtime and potential data breaches.

Potential Impact

For European organizations, the impact of CVE-2025-10847 could be substantial. Broadcom UIM is widely used in large enterprises and critical infrastructure sectors such as telecommunications, energy, and finance across Europe. Successful exploitation could allow attackers to execute arbitrary commands remotely, potentially leading to system compromise, data theft, or disruption of monitoring services. This could result in operational downtime, loss of visibility into infrastructure health, and cascading failures in dependent systems. Confidentiality breaches could expose sensitive operational data, while integrity violations could allow attackers to manipulate monitoring data, masking malicious activity. Availability impacts could disrupt automated management tasks, delaying incident response and recovery. The high attack complexity and partial authentication requirement reduce the likelihood of widespread exploitation but do not eliminate risk, especially from skilled threat actors targeting high-value assets. The absence of known exploits in the wild provides a window for proactive defense. However, organizations relying heavily on Broadcom UIM should prioritize risk assessment and mitigation to prevent potential attacks that could affect critical European infrastructure and business continuity.

Mitigation Recommendations

1. Apply official patches from Broadcom immediately upon release to remediate the vulnerability at the source. 2. Until patches are available, restrict network access to the robot (controller) component by implementing strict firewall rules and network segmentation, limiting exposure to trusted management networks only. 3. Employ strong authentication and authorization controls around UIM components to reduce the risk of unauthorized access. 4. Monitor network traffic and system logs for unusual command execution or file access patterns indicative of exploitation attempts. 5. Conduct regular vulnerability assessments and penetration testing focusing on UIM deployments to identify and remediate potential weaknesses. 6. Implement intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics tailored to detect anomalous activity related to UIM robot communications. 7. Educate IT and security teams about this vulnerability and ensure incident response plans include scenarios involving UIM compromise. 8. Consider isolating UIM management infrastructure from internet-facing networks and limit administrative access to dedicated secure environments. 9. Maintain up-to-date asset inventories to quickly identify affected systems and prioritize remediation efforts. 10. Collaborate with Broadcom support and security advisories to stay informed about updates and exploit developments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
symantec
Date Reserved
2025-09-22T05:46:46.329Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68dd07a25471b4f5afeb8f05

Added to database: 10/1/2025, 10:51:14 AM

Last enriched: 10/8/2025, 11:01:23 AM

Last updated: 11/16/2025, 12:22:48 AM

Views: 92

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats