Skip to main content

CVE-2025-10847: Vulnerability in Broadcom Unified Infrastructure Management

High
VulnerabilityCVE-2025-10847cvecve-2025-10847
Published: Wed Oct 01 2025 (10/01/2025, 10:48:12 UTC)
Source: CVE Database V5
Vendor/Project: Broadcom
Product: Unified Infrastructure Management

Description

DX Unified Infrastructure Management (Nimsoft/UIM) and below contains an improper ACL handling vulnerability in the robot (controller) component. A remote attacker can execute commands, read from, or write to the target system.

AI-Powered Analysis

AILast updated: 10/01/2025, 10:51:44 UTC

Technical Analysis

CVE-2025-10847 is a high-severity vulnerability affecting Broadcom's Unified Infrastructure Management (UIM) product, specifically version 23.4.5 and earlier. The vulnerability resides in the robot (controller) component of the DX Unified Infrastructure Management platform, which is responsible for orchestrating and managing infrastructure monitoring tasks. The issue is due to improper Access Control List (ACL) handling, allowing a remote attacker to execute arbitrary commands and perform unauthorized read and write operations on the target system without requiring authentication or user interaction. The CVSS 4.0 base score of 8.4 reflects the critical nature of this vulnerability, highlighting its network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and significant impacts on confidentiality, integrity, and availability (CI:A:H, IA:H, AV:H). The vulnerability's scope is limited (SC:L), meaning it does not affect resources beyond the vulnerable component, but the potential for remote code execution and data manipulation poses a serious risk to affected environments. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a prime target for attackers aiming to compromise infrastructure monitoring systems, which often have privileged access to critical network and system data.

Potential Impact

For European organizations, the exploitation of CVE-2025-10847 could lead to severe operational disruptions and data breaches. UIM is widely used in enterprise environments for monitoring and managing IT infrastructure, including servers, networks, and applications. Successful exploitation could allow attackers to execute arbitrary commands remotely, potentially leading to full system compromise, unauthorized data access, and manipulation of monitoring data, which could mask further malicious activities. This undermines the integrity and availability of critical infrastructure monitoring, increasing the risk of undetected attacks and prolonged downtime. Given the reliance on UIM in sectors such as finance, telecommunications, energy, and government within Europe, the vulnerability could impact service continuity and regulatory compliance, especially under GDPR and other data protection frameworks. The high severity and ease of remote exploitation without authentication amplify the threat, necessitating urgent attention from European organizations using affected versions.

Mitigation Recommendations

To mitigate CVE-2025-10847, European organizations should immediately assess their deployment of Broadcom UIM, focusing on version 23.4.5 and earlier. Since no patch links are currently provided, organizations should engage directly with Broadcom support for available security updates or workarounds. In the interim, network-level mitigations such as restricting access to the UIM robot component to trusted management networks via firewall rules and VPNs should be implemented to reduce exposure. Employing network segmentation to isolate UIM servers from general user and internet-facing networks can limit attack vectors. Monitoring and logging of UIM robot component activity should be enhanced to detect anomalous command executions or unauthorized access attempts. Additionally, organizations should review and tighten ACL configurations and consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting suspicious UIM traffic. Regular vulnerability scanning and penetration testing focused on infrastructure management tools will help identify residual risks. Finally, organizations should prepare incident response plans specific to infrastructure management compromise scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
symantec
Date Reserved
2025-09-22T05:46:46.329Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68dd07a25471b4f5afeb8f05

Added to database: 10/1/2025, 10:51:14 AM

Last enriched: 10/1/2025, 10:51:44 AM

Last updated: 10/2/2025, 2:51:07 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats