CVE-2025-10847: Vulnerability in Broadcom Unified Infrastructure Management
DX Unified Infrastructure Management (Nimsoft/UIM) and below contains an improper ACL handling vulnerability in the robot (controller) component. A remote attacker can execute commands, read from, or write to the target system.
AI Analysis
Technical Summary
CVE-2025-10847 is a vulnerability identified in Broadcom's Unified Infrastructure Management (UIM) product, version 23.4.5 and earlier. The issue stems from improper Access Control List (ACL) handling within the robot (controller) component, a critical part of the UIM architecture responsible for executing monitoring tasks and commands. This flaw allows a remote attacker to execute arbitrary commands and perform unauthorized read and write operations on the target system. The vulnerability does not require prior authentication or user interaction, increasing its risk profile. However, the attack complexity is high, and partial authentication is needed, which somewhat limits exploitation ease. The vulnerability affects confidentiality, integrity, and availability by enabling unauthorized command execution and data manipulation. The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), partial authentication (AT:P), no privileges required (PR:N), no user interaction (UI:N), and high impact on integrity and availability. No public exploits are known at this time, but the potential for severe impact on enterprise infrastructure monitoring systems is significant. The vulnerability is categorized under CWE-284, indicating improper access control. Broadcom has not yet released patches, so mitigation currently relies on network-level controls and monitoring. The robot component should be isolated from untrusted networks, and access should be tightly controlled. Organizations should monitor for unusual command execution patterns and unauthorized file access attempts. Given the critical role of UIM in enterprise IT operations, exploitation could disrupt monitoring and management functions, leading to operational downtime and potential data breaches.
Potential Impact
For European organizations, the impact of CVE-2025-10847 could be substantial. Broadcom UIM is widely used in large enterprises and critical infrastructure sectors such as telecommunications, energy, and finance across Europe. Successful exploitation could allow attackers to execute arbitrary commands remotely, potentially leading to system compromise, data theft, or disruption of monitoring services. This could result in operational downtime, loss of visibility into infrastructure health, and cascading failures in dependent systems. Confidentiality breaches could expose sensitive operational data, while integrity violations could allow attackers to manipulate monitoring data, masking malicious activity. Availability impacts could disrupt automated management tasks, delaying incident response and recovery. The high attack complexity and partial authentication requirement reduce the likelihood of widespread exploitation but do not eliminate risk, especially from skilled threat actors targeting high-value assets. The absence of known exploits in the wild provides a window for proactive defense. However, organizations relying heavily on Broadcom UIM should prioritize risk assessment and mitigation to prevent potential attacks that could affect critical European infrastructure and business continuity.
Mitigation Recommendations
1. Apply official patches from Broadcom immediately upon release to remediate the vulnerability at the source. 2. Until patches are available, restrict network access to the robot (controller) component by implementing strict firewall rules and network segmentation, limiting exposure to trusted management networks only. 3. Employ strong authentication and authorization controls around UIM components to reduce the risk of unauthorized access. 4. Monitor network traffic and system logs for unusual command execution or file access patterns indicative of exploitation attempts. 5. Conduct regular vulnerability assessments and penetration testing focusing on UIM deployments to identify and remediate potential weaknesses. 6. Implement intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics tailored to detect anomalous activity related to UIM robot communications. 7. Educate IT and security teams about this vulnerability and ensure incident response plans include scenarios involving UIM compromise. 8. Consider isolating UIM management infrastructure from internet-facing networks and limit administrative access to dedicated secure environments. 9. Maintain up-to-date asset inventories to quickly identify affected systems and prioritize remediation efforts. 10. Collaborate with Broadcom support and security advisories to stay informed about updates and exploit developments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-10847: Vulnerability in Broadcom Unified Infrastructure Management
Description
DX Unified Infrastructure Management (Nimsoft/UIM) and below contains an improper ACL handling vulnerability in the robot (controller) component. A remote attacker can execute commands, read from, or write to the target system.
AI-Powered Analysis
Technical Analysis
CVE-2025-10847 is a vulnerability identified in Broadcom's Unified Infrastructure Management (UIM) product, version 23.4.5 and earlier. The issue stems from improper Access Control List (ACL) handling within the robot (controller) component, a critical part of the UIM architecture responsible for executing monitoring tasks and commands. This flaw allows a remote attacker to execute arbitrary commands and perform unauthorized read and write operations on the target system. The vulnerability does not require prior authentication or user interaction, increasing its risk profile. However, the attack complexity is high, and partial authentication is needed, which somewhat limits exploitation ease. The vulnerability affects confidentiality, integrity, and availability by enabling unauthorized command execution and data manipulation. The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), partial authentication (AT:P), no privileges required (PR:N), no user interaction (UI:N), and high impact on integrity and availability. No public exploits are known at this time, but the potential for severe impact on enterprise infrastructure monitoring systems is significant. The vulnerability is categorized under CWE-284, indicating improper access control. Broadcom has not yet released patches, so mitigation currently relies on network-level controls and monitoring. The robot component should be isolated from untrusted networks, and access should be tightly controlled. Organizations should monitor for unusual command execution patterns and unauthorized file access attempts. Given the critical role of UIM in enterprise IT operations, exploitation could disrupt monitoring and management functions, leading to operational downtime and potential data breaches.
Potential Impact
For European organizations, the impact of CVE-2025-10847 could be substantial. Broadcom UIM is widely used in large enterprises and critical infrastructure sectors such as telecommunications, energy, and finance across Europe. Successful exploitation could allow attackers to execute arbitrary commands remotely, potentially leading to system compromise, data theft, or disruption of monitoring services. This could result in operational downtime, loss of visibility into infrastructure health, and cascading failures in dependent systems. Confidentiality breaches could expose sensitive operational data, while integrity violations could allow attackers to manipulate monitoring data, masking malicious activity. Availability impacts could disrupt automated management tasks, delaying incident response and recovery. The high attack complexity and partial authentication requirement reduce the likelihood of widespread exploitation but do not eliminate risk, especially from skilled threat actors targeting high-value assets. The absence of known exploits in the wild provides a window for proactive defense. However, organizations relying heavily on Broadcom UIM should prioritize risk assessment and mitigation to prevent potential attacks that could affect critical European infrastructure and business continuity.
Mitigation Recommendations
1. Apply official patches from Broadcom immediately upon release to remediate the vulnerability at the source. 2. Until patches are available, restrict network access to the robot (controller) component by implementing strict firewall rules and network segmentation, limiting exposure to trusted management networks only. 3. Employ strong authentication and authorization controls around UIM components to reduce the risk of unauthorized access. 4. Monitor network traffic and system logs for unusual command execution or file access patterns indicative of exploitation attempts. 5. Conduct regular vulnerability assessments and penetration testing focusing on UIM deployments to identify and remediate potential weaknesses. 6. Implement intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics tailored to detect anomalous activity related to UIM robot communications. 7. Educate IT and security teams about this vulnerability and ensure incident response plans include scenarios involving UIM compromise. 8. Consider isolating UIM management infrastructure from internet-facing networks and limit administrative access to dedicated secure environments. 9. Maintain up-to-date asset inventories to quickly identify affected systems and prioritize remediation efforts. 10. Collaborate with Broadcom support and security advisories to stay informed about updates and exploit developments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- symantec
- Date Reserved
- 2025-09-22T05:46:46.329Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68dd07a25471b4f5afeb8f05
Added to database: 10/1/2025, 10:51:14 AM
Last enriched: 10/8/2025, 11:01:23 AM
Last updated: 11/16/2025, 12:22:48 AM
Views: 92
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-2448
UnknownCVE-2025-13221: Unprotected Storage of Credentials in Intelbras UnniTI
MediumCVE-2025-13209: XML External Entity Reference in bestfeng oa_git_free
MediumCVE-2025-13210: SQL Injection in itsourcecode Inventory Management System
MediumCVE-2025-13208: SQL Injection in FantasticLBP Hotels Server
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.