CVE-2025-10847

N/A Unknown

📋 TL;DR

DX Unified Infrastructure Management (Nimsoft/UIM) has an improper ACL handling vulnerability in its robot controller component that allows remote attackers to execute commands, read from, or write to the target system. This affects all organizations running vulnerable versions of DX UIM/Nimsoft.

💻 Affected Systems

Products:
  • DX Unified Infrastructure Management
  • Nimsoft UIM
Versions: All versions below the patched version
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The robot controller component is vulnerable in default configurations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with remote code execution leading to data theft, ransomware deployment, or complete system takeover.

🟠

Likely Case

Unauthorized command execution allowing attackers to install malware, exfiltrate sensitive data, or pivot to other systems.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH - Remote attackers can exploit this without authentication if vulnerable systems are exposed to the internet.
🏢 Internal Only: HIGH - Even internally, this allows lateral movement and privilege escalation within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows remote exploitation without authentication, making it relatively easy to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Broadcom advisory for specific patched versions

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36180

Restart Required: Yes

Instructions:

1. Review Broadcom advisory for patched versions. 2. Download and apply the latest security patch from Broadcom support. 3. Restart affected UIM services. 4. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to UIM robot controller ports

Use firewall rules to block external access to UIM ports (default 48000-48010)

Access Control Lists

all

Implement strict ACLs to limit which systems can communicate with UIM controllers

Configure network ACLs to allow only trusted management systems

🧯 If You Can't Patch

  • Isolate vulnerable systems in a separate network segment with strict access controls
  • Implement application-level firewalls to monitor and block suspicious commands to UIM controllers

🔍 How to Verify

Check if Vulnerable:

Check UIM version against Broadcom advisory and verify if robot controller is accessible from untrusted networks

Check Version:

On UIM server: nimsoft\bin\controller.exe -v (Windows) or /opt/nimsoft/bin/controller -v (Linux)

Verify Fix Applied:

Verify UIM version is updated to patched version and test that remote command execution is no longer possible

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in UIM logs
  • Unauthorized access attempts to robot controller
  • Suspicious process creation from UIM components

Network Indicators:

  • Unexpected connections to UIM robot controller ports (48000-48010)
  • Command and control traffic from UIM systems

SIEM Query:

source="uim_logs" AND (event="command_execution" OR event="unauthorized_access")

🔗 References

📤 Share & Export