CVE-2025-55111: CWE-276 Incorrect Default Permissions in BMC Control-M/Agent
Certain files with overly permissive permissions were identified in the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions as well as in newer versions which were upgraded from an affected version. These files contain keys and passwords relating to SSL files, keystore and policies. An attacker with local access to the system running the Agent can access these files.
AI Analysis
Technical Summary
CVE-2025-55111 is a medium-severity vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting BMC's Control-M/Agent software versions 9.0.18 through 9.0.20, as well as potentially earlier unsupported versions and newer versions upgraded from these affected releases. The vulnerability arises from certain files within the Control-M/Agent installation that have overly permissive default file permissions. These files contain sensitive cryptographic material, including SSL keys, keystore contents, and policy files. Because these files are accessible with insufficient access controls, an attacker who has local access to the system running the Control-M/Agent can read these files and extract sensitive credentials and keys. This exposure could allow the attacker to compromise the confidentiality of communications secured by these keys or potentially impersonate the agent or escalate privileges. The vulnerability does not require user interaction but does require at least low-level privileges (local access with some privileges) to exploit. The CVSS 4.0 vector indicates an attack vector of local (AV:L), low complexity (AC:L), partial attack complexity (AT:P), privileges required are low (PR:L), no user interaction (UI:N), and high impact on confidentiality (VC:H) with no impact on integrity or availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The issue is particularly relevant for organizations running out-of-support versions or those that have upgraded from affected versions without remediating file permissions. The vulnerability highlights the risk of improper file permission management in critical enterprise software components that handle sensitive cryptographic material.
Potential Impact
For European organizations, the impact of CVE-2025-55111 can be significant, especially for those relying on BMC Control-M/Agent for workload automation and job scheduling in critical IT environments. Exposure of SSL keys and keystore passwords can lead to unauthorized decryption of encrypted communications, impersonation of the Control-M agent, and potential lateral movement within the network. This can compromise the confidentiality of sensitive business data and disrupt automated workflows. Since the vulnerability requires local access with some privileges, it increases the risk if an attacker gains foothold via other means (e.g., phishing, insider threat, or compromised credentials). Organizations in sectors with strict data protection regulations such as finance, healthcare, and government may face compliance risks and reputational damage if such a breach occurs. Additionally, the presence of this vulnerability in out-of-support versions complicates remediation efforts, potentially leaving critical systems exposed. The lack of known exploits reduces immediate risk but does not eliminate the threat, as attackers could develop exploits given the detailed vulnerability information.
Mitigation Recommendations
1. Conduct an immediate audit of all Control-M/Agent installations to identify versions 9.0.18 through 9.0.20 and any earlier unsupported versions or upgraded systems from these versions. 2. Manually verify and correct file permissions on all sensitive files containing SSL keys, keystore, and policy data to restrict access strictly to the Control-M/Agent service account and system administrators only. 3. Implement strict local access controls and limit user privileges on systems running Control-M/Agent to reduce the risk of local exploitation. 4. Monitor local system access logs for unusual activity indicative of unauthorized local access attempts. 5. Engage with BMC support or official channels to obtain any forthcoming patches or guidance and plan for timely upgrades to supported, patched versions. 6. Consider isolating Control-M/Agent hosts in segmented network zones to limit lateral movement if compromise occurs. 7. Employ file integrity monitoring solutions to detect unauthorized changes to sensitive files. 8. Review and enhance endpoint security controls to prevent privilege escalation and unauthorized local access.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-55111: CWE-276 Incorrect Default Permissions in BMC Control-M/Agent
Description
Certain files with overly permissive permissions were identified in the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions as well as in newer versions which were upgraded from an affected version. These files contain keys and passwords relating to SSL files, keystore and policies. An attacker with local access to the system running the Agent can access these files.
AI-Powered Analysis
Technical Analysis
CVE-2025-55111 is a medium-severity vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting BMC's Control-M/Agent software versions 9.0.18 through 9.0.20, as well as potentially earlier unsupported versions and newer versions upgraded from these affected releases. The vulnerability arises from certain files within the Control-M/Agent installation that have overly permissive default file permissions. These files contain sensitive cryptographic material, including SSL keys, keystore contents, and policy files. Because these files are accessible with insufficient access controls, an attacker who has local access to the system running the Control-M/Agent can read these files and extract sensitive credentials and keys. This exposure could allow the attacker to compromise the confidentiality of communications secured by these keys or potentially impersonate the agent or escalate privileges. The vulnerability does not require user interaction but does require at least low-level privileges (local access with some privileges) to exploit. The CVSS 4.0 vector indicates an attack vector of local (AV:L), low complexity (AC:L), partial attack complexity (AT:P), privileges required are low (PR:L), no user interaction (UI:N), and high impact on confidentiality (VC:H) with no impact on integrity or availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The issue is particularly relevant for organizations running out-of-support versions or those that have upgraded from affected versions without remediating file permissions. The vulnerability highlights the risk of improper file permission management in critical enterprise software components that handle sensitive cryptographic material.
Potential Impact
For European organizations, the impact of CVE-2025-55111 can be significant, especially for those relying on BMC Control-M/Agent for workload automation and job scheduling in critical IT environments. Exposure of SSL keys and keystore passwords can lead to unauthorized decryption of encrypted communications, impersonation of the Control-M agent, and potential lateral movement within the network. This can compromise the confidentiality of sensitive business data and disrupt automated workflows. Since the vulnerability requires local access with some privileges, it increases the risk if an attacker gains foothold via other means (e.g., phishing, insider threat, or compromised credentials). Organizations in sectors with strict data protection regulations such as finance, healthcare, and government may face compliance risks and reputational damage if such a breach occurs. Additionally, the presence of this vulnerability in out-of-support versions complicates remediation efforts, potentially leaving critical systems exposed. The lack of known exploits reduces immediate risk but does not eliminate the threat, as attackers could develop exploits given the detailed vulnerability information.
Mitigation Recommendations
1. Conduct an immediate audit of all Control-M/Agent installations to identify versions 9.0.18 through 9.0.20 and any earlier unsupported versions or upgraded systems from these versions. 2. Manually verify and correct file permissions on all sensitive files containing SSL keys, keystore, and policy data to restrict access strictly to the Control-M/Agent service account and system administrators only. 3. Implement strict local access controls and limit user privileges on systems running Control-M/Agent to reduce the risk of local exploitation. 4. Monitor local system access logs for unusual activity indicative of unauthorized local access attempts. 5. Engage with BMC support or official channels to obtain any forthcoming patches or guidance and plan for timely upgrades to supported, patched versions. 6. Consider isolating Control-M/Agent hosts in segmented network zones to limit lateral movement if compromise occurs. 7. Employ file integrity monitoring solutions to detect unauthorized changes to sensitive files. 8. Review and enhance endpoint security controls to prevent privilege escalation and unauthorized local access.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- airbus
- Date Reserved
- 2025-08-07T07:23:59.125Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c958bfff7c553b3ddd1f16
Added to database: 9/16/2025, 12:31:59 PM
Last enriched: 9/16/2025, 12:33:51 PM
Last updated: 9/16/2025, 6:39:41 PM
Views: 5
Related Threats
CVE-2025-37125: Vulnerability in Hewlett Packard Enterprise (HPE) HPE Aruba Networking EdgeConnect SD-WAN Gateway
HighCVE-2025-37124: Vulnerability in Hewlett Packard Enterprise (HPE) HPE Aruba Networking EdgeConnect SD-WAN Gateway
HighCVE-2025-37123: Vulnerability in Hewlett Packard Enterprise (HPE) HPE Aruba Networking EdgeConnect SD-WAN Gateway
HighCVE-2025-43804: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-37131: Vulnerability in Hewlett Packard Enterprise (HPE) HPE Aruba Networking EdgeConnect SD-WAN Gateway
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.