Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55115: CWE-23 Relative Path Traversal in BMC Control-M/Agent

0
Critical
VulnerabilityCVE-2025-55115cvecve-2025-55115cwe-23
Published: Tue Sep 16 2025 (09/16/2025, 12:21:51 UTC)
Source: CVE Database V5
Vendor/Project: BMC
Product: Control-M/Agent

Description

A path traversal in the Control-M/Agent can lead to a local privilege escalation when an attacker has access to the system running the Agent. This vulnerability impacts the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions. This vulnerability was fixed in 9.0.20.100 and above.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 03:46:18 UTC

Technical Analysis

CVE-2025-55115 is a relative path traversal vulnerability classified under CWE-23 affecting BMC's Control-M/Agent software, specifically versions 9.0.18 through 9.0.20 and potentially earlier unsupported releases. Control-M/Agent is a workload automation tool widely used in enterprise environments to manage batch jobs and workflows. The vulnerability arises because the software improperly validates file path inputs, allowing an attacker with local access to manipulate file paths to access or overwrite arbitrary files on the system. This can lead to local privilege escalation, enabling the attacker to gain higher system privileges than initially granted. The flaw requires the attacker to have some level of local access (local vector) and privileges but does not require user interaction or network access. The vulnerability impacts confidentiality, integrity, and availability at a high level, as it can allow unauthorized file access and modification, potentially compromising the entire system. The issue was addressed in version 9.0.20.100 and later. Despite no known exploits in the wild, the critical CVSS score of 9.3 reflects the serious risk posed by this vulnerability in environments where Control-M/Agent is deployed.

Potential Impact

The vulnerability enables local attackers to escalate privileges by exploiting path traversal to access or modify sensitive files, potentially leading to full system compromise. For organizations relying on Control-M/Agent for critical batch processing and workflow automation, this could disrupt operations, expose sensitive data, and allow attackers to implant persistent malicious code. The impact extends to confidentiality, integrity, and availability, as attackers could read confidential files, alter system configurations, or disrupt job scheduling. Given the widespread use of Control-M/Agent in financial, healthcare, manufacturing, and government sectors, exploitation could have severe operational and reputational consequences. The requirement for local access limits remote exploitation but insider threats or attackers who gain initial foothold could leverage this vulnerability to escalate privileges and move laterally within networks.

Mitigation Recommendations

Organizations should immediately identify and inventory all instances of BMC Control-M/Agent, focusing on versions 9.0.18 through 9.0.20 and earlier unsupported releases. The primary mitigation is to upgrade all affected agents to version 9.0.20.100 or later, where the vulnerability is patched. If immediate upgrade is not feasible, restrict local access to systems running the Control-M/Agent to trusted personnel only and implement strict access controls and monitoring for suspicious activity. Employ host-based intrusion detection systems (HIDS) to detect unusual file access patterns indicative of path traversal exploitation. Regularly audit file permissions and system logs for anomalies. Additionally, consider isolating Control-M/Agent hosts in segmented network zones to limit lateral movement in case of compromise. Maintain up-to-date backups to enable recovery from potential attacks. Finally, educate system administrators about the risks of local privilege escalation vulnerabilities and the importance of timely patching.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
airbus
Date Reserved
2025-08-07T07:24:22.470Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c958bfff7c553b3ddd1f26

Added to database: 9/16/2025, 12:31:59 PM

Last enriched: 2/27/2026, 3:46:18 AM

Last updated: 3/26/2026, 11:09:03 AM

Views: 103

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses