CVE-2025-10847: Vulnerability in Broadcom Unified Infrastructure Management
DX Unified Infrastructure Management (Nimsoft/UIM) and below contains an improper ACL handling vulnerability in the robot (controller) component. A remote attacker can execute commands, read from, or write to the target system.
AI Analysis
Technical Summary
CVE-2025-10847 is a vulnerability identified in Broadcom's Unified Infrastructure Management (UIM) product, version 23.4.5 and earlier. The issue lies in the robot (controller) component, which improperly handles Access Control Lists (ACLs), a critical security mechanism that restricts access to system resources. This improper ACL handling allows a remote attacker to bypass intended access restrictions and execute arbitrary commands on the affected system. Additionally, the attacker can read from or write to the file system, potentially leading to data leakage, unauthorized modification, or destruction of data. The vulnerability does not require authentication or user interaction, increasing its risk profile. However, the attack complexity is high, meaning exploitation requires specific conditions or expertise. The CVSS 4.0 base score is 8.4, reflecting high severity, with vector metrics indicating network attack vector, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. The scope is limited to the vulnerable component without affecting other components. No known exploits have been reported in the wild yet, but the potential impact on critical infrastructure monitoring systems is significant. The vulnerability is categorized under CWE-284, which relates to improper access control. As Broadcom UIM is widely used for monitoring and managing IT infrastructure, this vulnerability poses a substantial risk to organizations relying on it for operational continuity and security.
Potential Impact
The vulnerability allows remote attackers to execute arbitrary commands and manipulate files on systems running vulnerable versions of Broadcom UIM without authentication or user interaction. This can lead to full system compromise, unauthorized data access, data corruption, or service disruption. Organizations using UIM for infrastructure monitoring could face operational outages, loss of sensitive information, and potential lateral movement within their networks. The impact extends to confidentiality, integrity, and availability of critical infrastructure management systems, potentially affecting business continuity and compliance with regulatory requirements. Given the high attack complexity, exploitation may be limited to skilled attackers or those with specific network access, but the absence of authentication requirements increases the risk if network defenses are weak. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as threat actors may develop exploits over time. Industries relying heavily on Broadcom UIM, such as telecommunications, finance, government, and large enterprises, could experience significant operational and reputational damage if exploited.
Mitigation Recommendations
1. Apply official patches or updates from Broadcom as soon as they become available to address the improper ACL handling in the robot component. 2. Until patches are released, restrict network access to the robot component by implementing firewall rules that limit connections to trusted management networks only. 3. Employ network segmentation to isolate the UIM infrastructure from general user and internet-facing networks, reducing exposure to remote attackers. 4. Monitor network traffic and system logs for unusual activity related to the robot component, such as unexpected command executions or file access patterns. 5. Conduct regular security assessments and penetration testing focused on UIM deployments to identify and remediate configuration weaknesses. 6. Implement strict access controls and least privilege principles for users and services interacting with the UIM system. 7. Educate IT and security teams about this vulnerability to ensure rapid detection and response to potential exploitation attempts. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting anomalous behavior related to this vulnerability once available.
Affected Countries
United States, Germany, United Kingdom, Japan, Australia, Canada, France, South Korea, Netherlands, Singapore
CVE-2025-10847: Vulnerability in Broadcom Unified Infrastructure Management
Description
DX Unified Infrastructure Management (Nimsoft/UIM) and below contains an improper ACL handling vulnerability in the robot (controller) component. A remote attacker can execute commands, read from, or write to the target system.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-10847 is a vulnerability identified in Broadcom's Unified Infrastructure Management (UIM) product, version 23.4.5 and earlier. The issue lies in the robot (controller) component, which improperly handles Access Control Lists (ACLs), a critical security mechanism that restricts access to system resources. This improper ACL handling allows a remote attacker to bypass intended access restrictions and execute arbitrary commands on the affected system. Additionally, the attacker can read from or write to the file system, potentially leading to data leakage, unauthorized modification, or destruction of data. The vulnerability does not require authentication or user interaction, increasing its risk profile. However, the attack complexity is high, meaning exploitation requires specific conditions or expertise. The CVSS 4.0 base score is 8.4, reflecting high severity, with vector metrics indicating network attack vector, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. The scope is limited to the vulnerable component without affecting other components. No known exploits have been reported in the wild yet, but the potential impact on critical infrastructure monitoring systems is significant. The vulnerability is categorized under CWE-284, which relates to improper access control. As Broadcom UIM is widely used for monitoring and managing IT infrastructure, this vulnerability poses a substantial risk to organizations relying on it for operational continuity and security.
Potential Impact
The vulnerability allows remote attackers to execute arbitrary commands and manipulate files on systems running vulnerable versions of Broadcom UIM without authentication or user interaction. This can lead to full system compromise, unauthorized data access, data corruption, or service disruption. Organizations using UIM for infrastructure monitoring could face operational outages, loss of sensitive information, and potential lateral movement within their networks. The impact extends to confidentiality, integrity, and availability of critical infrastructure management systems, potentially affecting business continuity and compliance with regulatory requirements. Given the high attack complexity, exploitation may be limited to skilled attackers or those with specific network access, but the absence of authentication requirements increases the risk if network defenses are weak. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as threat actors may develop exploits over time. Industries relying heavily on Broadcom UIM, such as telecommunications, finance, government, and large enterprises, could experience significant operational and reputational damage if exploited.
Mitigation Recommendations
1. Apply official patches or updates from Broadcom as soon as they become available to address the improper ACL handling in the robot component. 2. Until patches are released, restrict network access to the robot component by implementing firewall rules that limit connections to trusted management networks only. 3. Employ network segmentation to isolate the UIM infrastructure from general user and internet-facing networks, reducing exposure to remote attackers. 4. Monitor network traffic and system logs for unusual activity related to the robot component, such as unexpected command executions or file access patterns. 5. Conduct regular security assessments and penetration testing focused on UIM deployments to identify and remediate configuration weaknesses. 6. Implement strict access controls and least privilege principles for users and services interacting with the UIM system. 7. Educate IT and security teams about this vulnerability to ensure rapid detection and response to potential exploitation attempts. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting anomalous behavior related to this vulnerability once available.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- symantec
- Date Reserved
- 2025-09-22T05:46:46.329Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68dd07a25471b4f5afeb8f05
Added to database: 10/1/2025, 10:51:14 AM
Last enriched: 2/26/2026, 10:10:16 PM
Last updated: 3/26/2026, 3:03:48 AM
Views: 239
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.