CVE-2025-8660

9.8 CRITICAL

📋 TL;DR

CVE-2025-8660 is a critical privilege escalation vulnerability in Broadcom software that allows authenticated users to gain elevated privileges beyond their intended access. This affects systems running vulnerable versions of Broadcom's enterprise software, potentially enabling attackers to compromise administrative controls.

💻 Affected Systems

Products:
  • Broadcom Enterprise Security Software
Versions: Specific versions not detailed in advisory; check Broadcom security advisory for exact affected versions
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations; requires authenticated user access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise where attackers gain root/administrator privileges, access sensitive data, deploy ransomware, or establish persistent backdoors across the network.

🟠

Likely Case

Attackers escalate from standard user to administrative privileges, enabling lateral movement, data exfiltration, and installation of additional malware.

🟢

If Mitigated

Limited impact with proper access controls, network segmentation, and monitoring preventing successful privilege escalation attempts.

🌐 Internet-Facing: HIGH if vulnerable systems are exposed to the internet, as authenticated attackers could exploit remotely.
🏢 Internal Only: HIGH as authenticated users (including compromised accounts) can exploit this from within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Broadcom advisory for specific patched versions

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36021

Restart Required: Yes

Instructions:

1. Review Broadcom security advisory 36021. 2. Download and apply the latest security patch from Broadcom support portal. 3. Restart affected services/systems. 4. Verify patch installation.

🔧 Temporary Workarounds

Restrict User Privileges

all

Implement least privilege access controls to limit user permissions

Network Segmentation

all

Isolate affected systems from critical network segments

🧯 If You Can't Patch

  • Implement strict access controls and monitor for privilege escalation attempts
  • Deploy application allowlisting to prevent unauthorized process execution

🔍 How to Verify

Check if Vulnerable:

Check installed Broadcom software version against affected versions in advisory 36021

Check Version:

Check Broadcom product documentation for specific version check commands

Verify Fix Applied:

Verify patch installation through Broadcom management console or version check commands

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Unauthorized access to administrative functions
  • Changes to user privilege levels

Network Indicators:

  • Unusual authentication patterns to administrative interfaces
  • Lateral movement from standard user systems

SIEM Query:

source="broadcom_logs" AND (event_type="privilege_escalation" OR user_privilege_change="true")

🔗 References

📤 Share & Export