CVE-2025-55113: CWE-158 Improper Neutralization of Null Byte or NUL Character in BMC Control-M/Agent
If the Access Control List is enforced by the Control-M/Agent and the C router is in use (default in Out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions; non-default but configurable using the JAVA_AR setting in newer versions), the verification stops at the first NULL byte encountered in the email address referenced in the client certificate. An attacker could bypass configured ACLs by using a specially crafted certificate.
AI Analysis
Technical Summary
CVE-2025-55113 is a critical vulnerability affecting BMC's Control-M/Agent software versions 9.0.18 through 9.0.22. The flaw arises from improper neutralization of null bytes (CWE-158) in the Access Control List (ACL) enforcement mechanism when the C router is in use. Specifically, the ACL verification process stops processing the email address field in the client certificate upon encountering the first null byte (NUL character). This behavior allows an attacker to craft a malicious client certificate with a null byte embedded in the email address, effectively truncating the ACL check and bypassing configured access restrictions. The vulnerability is present primarily in the default C router used in out-of-support versions 9.0.18 to 9.0.20 and can also be triggered in newer versions if the JAVA_AR setting is configured to use the C router. The CVSS 4.0 score of 9.5 (critical) reflects the high impact and network attack vector with no user interaction required. Exploitation does not require privileges or authentication, and the vulnerability affects confidentiality, integrity, and availability by potentially allowing unauthorized access and control over the Control-M/Agent. Although no known exploits are currently observed in the wild, the vulnerability's nature and severity make it a significant risk for organizations using affected versions of Control-M/Agent, especially those relying on client certificate-based ACL enforcement for security. The lack of available patches at the time of publication further increases the urgency for mitigation.
Potential Impact
For European organizations, the impact of CVE-2025-55113 is substantial. Control-M/Agent is widely used in enterprise environments for workload automation and job scheduling, often managing critical business processes and data flows. Unauthorized access via ACL bypass could lead to execution of unauthorized jobs, data leakage, or disruption of automated workflows, affecting business continuity and compliance with data protection regulations such as GDPR. The vulnerability compromises confidentiality by allowing attackers to impersonate authorized clients, integrity by enabling unauthorized job execution or modification, and availability by potentially disrupting scheduled operations. Given the critical nature of Control-M/Agent in sectors like finance, manufacturing, telecommunications, and public services across Europe, exploitation could have cascading effects on operational stability and regulatory compliance. Additionally, the vulnerability's exploitation could facilitate lateral movement within networks, increasing the risk of broader compromise.
Mitigation Recommendations
Immediate mitigation steps include: 1) Identifying and inventorying all instances of Control-M/Agent within the environment, focusing on versions 9.0.18 through 9.0.22. 2) Disabling the use of the C router where possible, especially the JAVA_AR setting that enables it in newer versions, to prevent the vulnerable ACL verification path from being used. 3) Implementing strict certificate validation policies and monitoring for anomalous client certificate usage that may indicate attempts to exploit null byte injection. 4) Applying network segmentation and access controls to limit exposure of Control-M/Agent interfaces to trusted hosts only. 5) Monitoring logs and network traffic for unusual access patterns or failed ACL checks that could signal exploitation attempts. 6) Engaging with BMC support for patches or updates as they become available and planning timely upgrades to versions that do not use the vulnerable C router or have fixed the issue. 7) Employing additional compensating controls such as multi-factor authentication and enhanced monitoring around Control-M/Agent operations to detect and respond to suspicious activities promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-55113: CWE-158 Improper Neutralization of Null Byte or NUL Character in BMC Control-M/Agent
Description
If the Access Control List is enforced by the Control-M/Agent and the C router is in use (default in Out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions; non-default but configurable using the JAVA_AR setting in newer versions), the verification stops at the first NULL byte encountered in the email address referenced in the client certificate. An attacker could bypass configured ACLs by using a specially crafted certificate.
AI-Powered Analysis
Technical Analysis
CVE-2025-55113 is a critical vulnerability affecting BMC's Control-M/Agent software versions 9.0.18 through 9.0.22. The flaw arises from improper neutralization of null bytes (CWE-158) in the Access Control List (ACL) enforcement mechanism when the C router is in use. Specifically, the ACL verification process stops processing the email address field in the client certificate upon encountering the first null byte (NUL character). This behavior allows an attacker to craft a malicious client certificate with a null byte embedded in the email address, effectively truncating the ACL check and bypassing configured access restrictions. The vulnerability is present primarily in the default C router used in out-of-support versions 9.0.18 to 9.0.20 and can also be triggered in newer versions if the JAVA_AR setting is configured to use the C router. The CVSS 4.0 score of 9.5 (critical) reflects the high impact and network attack vector with no user interaction required. Exploitation does not require privileges or authentication, and the vulnerability affects confidentiality, integrity, and availability by potentially allowing unauthorized access and control over the Control-M/Agent. Although no known exploits are currently observed in the wild, the vulnerability's nature and severity make it a significant risk for organizations using affected versions of Control-M/Agent, especially those relying on client certificate-based ACL enforcement for security. The lack of available patches at the time of publication further increases the urgency for mitigation.
Potential Impact
For European organizations, the impact of CVE-2025-55113 is substantial. Control-M/Agent is widely used in enterprise environments for workload automation and job scheduling, often managing critical business processes and data flows. Unauthorized access via ACL bypass could lead to execution of unauthorized jobs, data leakage, or disruption of automated workflows, affecting business continuity and compliance with data protection regulations such as GDPR. The vulnerability compromises confidentiality by allowing attackers to impersonate authorized clients, integrity by enabling unauthorized job execution or modification, and availability by potentially disrupting scheduled operations. Given the critical nature of Control-M/Agent in sectors like finance, manufacturing, telecommunications, and public services across Europe, exploitation could have cascading effects on operational stability and regulatory compliance. Additionally, the vulnerability's exploitation could facilitate lateral movement within networks, increasing the risk of broader compromise.
Mitigation Recommendations
Immediate mitigation steps include: 1) Identifying and inventorying all instances of Control-M/Agent within the environment, focusing on versions 9.0.18 through 9.0.22. 2) Disabling the use of the C router where possible, especially the JAVA_AR setting that enables it in newer versions, to prevent the vulnerable ACL verification path from being used. 3) Implementing strict certificate validation policies and monitoring for anomalous client certificate usage that may indicate attempts to exploit null byte injection. 4) Applying network segmentation and access controls to limit exposure of Control-M/Agent interfaces to trusted hosts only. 5) Monitoring logs and network traffic for unusual access patterns or failed ACL checks that could signal exploitation attempts. 6) Engaging with BMC support for patches or updates as they become available and planning timely upgrades to versions that do not use the vulnerable C router or have fixed the issue. 7) Employing additional compensating controls such as multi-factor authentication and enhanced monitoring around Control-M/Agent operations to detect and respond to suspicious activities promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- airbus
- Date Reserved
- 2025-08-07T07:24:22.470Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c958bfff7c553b3ddd1f1e
Added to database: 9/16/2025, 12:31:59 PM
Last enriched: 9/16/2025, 12:32:58 PM
Last updated: 9/17/2025, 8:13:54 AM
Views: 7
Related Threats
CVE-2025-10155: CWE-20 Improper Input Validation in mmaitre314 picklescan
CriticalCVE-2025-0420: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Paraşüt Software Paraşüt
MediumCVE-2025-9242: CWE-787 Out-of-bounds Write in WatchGuard Fireware OS
CriticalCVE-2025-9971: CWE-306 Missing Authentication for Critical Function in Planet Technology ICG-2510WG-LTE (EU/US)
CriticalCVE-2025-9450: CWE-457 Use of Uninitialized Variable in Dassault Systèmes SOLIDWORKS eDrawings
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.