CVE-2025-55111: CWE-276 Incorrect Default Permissions in BMC Control-M/Agent
Certain files with overly permissive permissions were identified in the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions as well as in newer versions which were upgraded from an affected version. These files contain keys and passwords relating to SSL files, keystore and policies. An attacker with local access to the system running the Agent can access these files.
AI Analysis
Technical Summary
CVE-2025-55111 is a medium-severity vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting BMC's Control-M/Agent software versions 9.0.18 through 9.0.20, as well as potentially earlier unsupported versions and newer versions upgraded from these affected releases. The vulnerability arises from certain files within the Control-M/Agent installation that have overly permissive default file permissions. These files contain sensitive cryptographic material, including SSL keys, keystore contents, and policy files. Because these files are accessible with insufficient access controls, an attacker who has local access to the system running the Control-M/Agent can read these files and extract sensitive credentials and keys. This exposure could allow the attacker to compromise the confidentiality of communications secured by these keys or potentially impersonate the agent or escalate privileges. The vulnerability does not require user interaction but does require at least low-level privileges (local access with some privileges) to exploit. The CVSS 4.0 vector indicates an attack vector of local (AV:L), low complexity (AC:L), partial attack complexity (AT:P), privileges required are low (PR:L), no user interaction (UI:N), and high impact on confidentiality (VC:H) with no impact on integrity or availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The issue is particularly relevant for organizations running out-of-support versions or those that have upgraded from affected versions without remediating file permissions. The vulnerability highlights the risk of improper file permission management in critical enterprise software components that handle sensitive cryptographic material.
Potential Impact
For European organizations, the impact of CVE-2025-55111 can be significant, especially for those relying on BMC Control-M/Agent for workload automation and job scheduling in critical IT environments. Exposure of SSL keys and keystore passwords can lead to unauthorized decryption of encrypted communications, impersonation of the Control-M agent, and potential lateral movement within the network. This can compromise the confidentiality of sensitive business data and disrupt automated workflows. Since the vulnerability requires local access with some privileges, it increases the risk if an attacker gains foothold via other means (e.g., phishing, insider threat, or compromised credentials). Organizations in sectors with strict data protection regulations such as finance, healthcare, and government may face compliance risks and reputational damage if such a breach occurs. Additionally, the presence of this vulnerability in out-of-support versions complicates remediation efforts, potentially leaving critical systems exposed. The lack of known exploits reduces immediate risk but does not eliminate the threat, as attackers could develop exploits given the detailed vulnerability information.
Mitigation Recommendations
1. Conduct an immediate audit of all Control-M/Agent installations to identify versions 9.0.18 through 9.0.20 and any earlier unsupported versions or upgraded systems from these versions. 2. Manually verify and correct file permissions on all sensitive files containing SSL keys, keystore, and policy data to restrict access strictly to the Control-M/Agent service account and system administrators only. 3. Implement strict local access controls and limit user privileges on systems running Control-M/Agent to reduce the risk of local exploitation. 4. Monitor local system access logs for unusual activity indicative of unauthorized local access attempts. 5. Engage with BMC support or official channels to obtain any forthcoming patches or guidance and plan for timely upgrades to supported, patched versions. 6. Consider isolating Control-M/Agent hosts in segmented network zones to limit lateral movement if compromise occurs. 7. Employ file integrity monitoring solutions to detect unauthorized changes to sensitive files. 8. Review and enhance endpoint security controls to prevent privilege escalation and unauthorized local access.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-55111: CWE-276 Incorrect Default Permissions in BMC Control-M/Agent
Description
Certain files with overly permissive permissions were identified in the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions as well as in newer versions which were upgraded from an affected version. These files contain keys and passwords relating to SSL files, keystore and policies. An attacker with local access to the system running the Agent can access these files.
AI-Powered Analysis
Technical Analysis
CVE-2025-55111 is a medium-severity vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting BMC's Control-M/Agent software versions 9.0.18 through 9.0.20, as well as potentially earlier unsupported versions and newer versions upgraded from these affected releases. The vulnerability arises from certain files within the Control-M/Agent installation that have overly permissive default file permissions. These files contain sensitive cryptographic material, including SSL keys, keystore contents, and policy files. Because these files are accessible with insufficient access controls, an attacker who has local access to the system running the Control-M/Agent can read these files and extract sensitive credentials and keys. This exposure could allow the attacker to compromise the confidentiality of communications secured by these keys or potentially impersonate the agent or escalate privileges. The vulnerability does not require user interaction but does require at least low-level privileges (local access with some privileges) to exploit. The CVSS 4.0 vector indicates an attack vector of local (AV:L), low complexity (AC:L), partial attack complexity (AT:P), privileges required are low (PR:L), no user interaction (UI:N), and high impact on confidentiality (VC:H) with no impact on integrity or availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The issue is particularly relevant for organizations running out-of-support versions or those that have upgraded from affected versions without remediating file permissions. The vulnerability highlights the risk of improper file permission management in critical enterprise software components that handle sensitive cryptographic material.
Potential Impact
For European organizations, the impact of CVE-2025-55111 can be significant, especially for those relying on BMC Control-M/Agent for workload automation and job scheduling in critical IT environments. Exposure of SSL keys and keystore passwords can lead to unauthorized decryption of encrypted communications, impersonation of the Control-M agent, and potential lateral movement within the network. This can compromise the confidentiality of sensitive business data and disrupt automated workflows. Since the vulnerability requires local access with some privileges, it increases the risk if an attacker gains foothold via other means (e.g., phishing, insider threat, or compromised credentials). Organizations in sectors with strict data protection regulations such as finance, healthcare, and government may face compliance risks and reputational damage if such a breach occurs. Additionally, the presence of this vulnerability in out-of-support versions complicates remediation efforts, potentially leaving critical systems exposed. The lack of known exploits reduces immediate risk but does not eliminate the threat, as attackers could develop exploits given the detailed vulnerability information.
Mitigation Recommendations
1. Conduct an immediate audit of all Control-M/Agent installations to identify versions 9.0.18 through 9.0.20 and any earlier unsupported versions or upgraded systems from these versions. 2. Manually verify and correct file permissions on all sensitive files containing SSL keys, keystore, and policy data to restrict access strictly to the Control-M/Agent service account and system administrators only. 3. Implement strict local access controls and limit user privileges on systems running Control-M/Agent to reduce the risk of local exploitation. 4. Monitor local system access logs for unusual activity indicative of unauthorized local access attempts. 5. Engage with BMC support or official channels to obtain any forthcoming patches or guidance and plan for timely upgrades to supported, patched versions. 6. Consider isolating Control-M/Agent hosts in segmented network zones to limit lateral movement if compromise occurs. 7. Employ file integrity monitoring solutions to detect unauthorized changes to sensitive files. 8. Review and enhance endpoint security controls to prevent privilege escalation and unauthorized local access.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
 - 5.1
 - Assigner Short Name
 - airbus
 - Date Reserved
 - 2025-08-07T07:23:59.125Z
 - Cvss Version
 - 4.0
 - State
 - PUBLISHED
 
Threat ID: 68c958bfff7c553b3ddd1f16
Added to database: 9/16/2025, 12:31:59 PM
Last enriched: 9/16/2025, 12:33:51 PM
Last updated: 10/29/2025, 9:19:17 AM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64291: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce User Roles
HighCVE-2025-64290: Cross-Site Request Forgery (CSRF) in Premmerce Premmerce Product Search for WooCommerce
HighCVE-2025-64289: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce Product Search for WooCommerce
HighCVE-2025-64286: Cross-Site Request Forgery (CSRF) in WpEstate WP Rentals
MediumCVE-2025-64285: Missing Authorization in Premmerce Premmerce Wholesale Pricing for WooCommerce
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.