Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55113: CWE-158 Improper Neutralization of Null Byte or NUL Character in BMC Control-M/Agent

0
Critical
VulnerabilityCVE-2025-55113cvecve-2025-55113cwe-158
Published: Tue Sep 16 2025 (09/16/2025, 12:20:03 UTC)
Source: CVE Database V5
Vendor/Project: BMC
Product: Control-M/Agent

Description

If the Access Control List is enforced by the Control-M/Agent and the C router is in use (default in Out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions; non-default but configurable using the JAVA_AR setting in newer versions), the verification stops at the first NULL byte encountered in the email address referenced in the client certificate. An attacker could bypass configured ACLs by using a specially crafted certificate.

AI-Powered Analysis

AILast updated: 09/24/2025, 01:19:51 UTC

Technical Analysis

CVE-2025-55113 is a critical vulnerability affecting BMC's Control-M/Agent software versions 9.0.18 through 9.0.22. The flaw stems from improper neutralization of null bytes (CWE-158) in the Access Control List (ACL) enforcement mechanism when the C router is used. This router is the default in out-of-support versions 9.0.18 to 9.0.20 and can be enabled via the JAVA_AR setting in newer versions. The vulnerability arises because the ACL verification process halts upon encountering the first null byte in the email address field of the client certificate. An attacker can exploit this by crafting a certificate with a null byte embedded in the email address, effectively truncating the string and bypassing ACL checks. This allows unauthorized access to the Control-M/Agent, potentially enabling attackers to execute unauthorized commands or access sensitive scheduling and automation functions. The vulnerability has a CVSS 4.0 score of 9.5, indicating critical severity with network attack vector, high complexity, no privileges required, no user interaction, and high impacts on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the high severity and ease of exploitation without authentication make this a significant threat. The lack of available patches at the time of publication increases the urgency for mitigation.

Potential Impact

For European organizations, the impact of this vulnerability can be severe, especially for enterprises relying on BMC Control-M/Agent for workload automation and job scheduling in critical IT environments. Successful exploitation could lead to unauthorized access to job scheduling controls, allowing attackers to disrupt business operations, manipulate automated workflows, or exfiltrate sensitive operational data. This could affect sectors such as finance, manufacturing, telecommunications, and government agencies where Control-M is commonly deployed. The breach of confidentiality and integrity of automated processes could result in operational downtime, financial losses, regulatory non-compliance (e.g., GDPR implications if personal data is involved), and reputational damage. Given the network-based attack vector and no requirement for authentication, attackers could remotely exploit vulnerable agents exposed to the internet or internal networks, increasing the risk of lateral movement within corporate networks.

Mitigation Recommendations

European organizations should immediately audit their Control-M/Agent deployments to identify affected versions (9.0.18 through 9.0.22). Since no official patches are currently available, organizations should consider the following mitigations: 1) Disable or avoid using the C router mode or JAVA_AR setting that enables it, switching to safer routing configurations if possible. 2) Restrict network exposure of Control-M/Agent instances by implementing strict firewall rules and network segmentation to limit access only to trusted hosts. 3) Enforce strict certificate validation policies and monitor for anomalous certificates that may contain null bytes or other suspicious characters. 4) Implement enhanced logging and monitoring around Control-M/Agent access to detect unusual authentication attempts or ACL bypass indicators. 5) Engage with BMC support for any available patches or workarounds and plan for timely updates once patches are released. 6) Conduct internal penetration testing focusing on ACL bypass attempts to validate the effectiveness of mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
airbus
Date Reserved
2025-08-07T07:24:22.470Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c958bfff7c553b3ddd1f1e

Added to database: 9/16/2025, 12:31:59 PM

Last enriched: 9/24/2025, 1:19:51 AM

Last updated: 12/18/2025, 8:59:46 PM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats