CVE-2025-55115: CWE-23 Relative Path Traversal in BMC Control-M/Agent
A path traversal in the Control-M/Agent can lead to a local privilege escalation when an attacker has access to the system running the Agent. This vulnerability impacts the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions. This vulnerability was fixed in 9.0.20.100 and above.
AI Analysis
Technical Summary
CVE-2025-55115 is a relative path traversal vulnerability classified under CWE-23 affecting BMC's Control-M/Agent software, specifically versions 9.0.18 through 9.0.20 and potentially earlier unsupported releases. Control-M/Agent is a workload automation tool widely used in enterprise environments to manage batch jobs and workflows. The vulnerability arises because the software improperly validates file path inputs, allowing an attacker with local access to manipulate file paths to access or overwrite arbitrary files on the system. This can lead to local privilege escalation, enabling the attacker to gain higher system privileges than initially granted. The flaw requires the attacker to have some level of local access (local vector) and privileges but does not require user interaction or network access. The vulnerability impacts confidentiality, integrity, and availability at a high level, as it can allow unauthorized file access and modification, potentially compromising the entire system. The issue was addressed in version 9.0.20.100 and later. Despite no known exploits in the wild, the critical CVSS score of 9.3 reflects the serious risk posed by this vulnerability in environments where Control-M/Agent is deployed.
Potential Impact
The vulnerability enables local attackers to escalate privileges by exploiting path traversal to access or modify sensitive files, potentially leading to full system compromise. For organizations relying on Control-M/Agent for critical batch processing and workflow automation, this could disrupt operations, expose sensitive data, and allow attackers to implant persistent malicious code. The impact extends to confidentiality, integrity, and availability, as attackers could read confidential files, alter system configurations, or disrupt job scheduling. Given the widespread use of Control-M/Agent in financial, healthcare, manufacturing, and government sectors, exploitation could have severe operational and reputational consequences. The requirement for local access limits remote exploitation but insider threats or attackers who gain initial foothold could leverage this vulnerability to escalate privileges and move laterally within networks.
Mitigation Recommendations
Organizations should immediately identify and inventory all instances of BMC Control-M/Agent, focusing on versions 9.0.18 through 9.0.20 and earlier unsupported releases. The primary mitigation is to upgrade all affected agents to version 9.0.20.100 or later, where the vulnerability is patched. If immediate upgrade is not feasible, restrict local access to systems running the Control-M/Agent to trusted personnel only and implement strict access controls and monitoring for suspicious activity. Employ host-based intrusion detection systems (HIDS) to detect unusual file access patterns indicative of path traversal exploitation. Regularly audit file permissions and system logs for anomalies. Additionally, consider isolating Control-M/Agent hosts in segmented network zones to limit lateral movement in case of compromise. Maintain up-to-date backups to enable recovery from potential attacks. Finally, educate system administrators about the risks of local privilege escalation vulnerabilities and the importance of timely patching.
Affected Countries
United States, United Kingdom, Germany, France, Canada, Australia, Japan, India, Netherlands, Switzerland, Singapore
CVE-2025-55115: CWE-23 Relative Path Traversal in BMC Control-M/Agent
Description
A path traversal in the Control-M/Agent can lead to a local privilege escalation when an attacker has access to the system running the Agent. This vulnerability impacts the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions. This vulnerability was fixed in 9.0.20.100 and above.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-55115 is a relative path traversal vulnerability classified under CWE-23 affecting BMC's Control-M/Agent software, specifically versions 9.0.18 through 9.0.20 and potentially earlier unsupported releases. Control-M/Agent is a workload automation tool widely used in enterprise environments to manage batch jobs and workflows. The vulnerability arises because the software improperly validates file path inputs, allowing an attacker with local access to manipulate file paths to access or overwrite arbitrary files on the system. This can lead to local privilege escalation, enabling the attacker to gain higher system privileges than initially granted. The flaw requires the attacker to have some level of local access (local vector) and privileges but does not require user interaction or network access. The vulnerability impacts confidentiality, integrity, and availability at a high level, as it can allow unauthorized file access and modification, potentially compromising the entire system. The issue was addressed in version 9.0.20.100 and later. Despite no known exploits in the wild, the critical CVSS score of 9.3 reflects the serious risk posed by this vulnerability in environments where Control-M/Agent is deployed.
Potential Impact
The vulnerability enables local attackers to escalate privileges by exploiting path traversal to access or modify sensitive files, potentially leading to full system compromise. For organizations relying on Control-M/Agent for critical batch processing and workflow automation, this could disrupt operations, expose sensitive data, and allow attackers to implant persistent malicious code. The impact extends to confidentiality, integrity, and availability, as attackers could read confidential files, alter system configurations, or disrupt job scheduling. Given the widespread use of Control-M/Agent in financial, healthcare, manufacturing, and government sectors, exploitation could have severe operational and reputational consequences. The requirement for local access limits remote exploitation but insider threats or attackers who gain initial foothold could leverage this vulnerability to escalate privileges and move laterally within networks.
Mitigation Recommendations
Organizations should immediately identify and inventory all instances of BMC Control-M/Agent, focusing on versions 9.0.18 through 9.0.20 and earlier unsupported releases. The primary mitigation is to upgrade all affected agents to version 9.0.20.100 or later, where the vulnerability is patched. If immediate upgrade is not feasible, restrict local access to systems running the Control-M/Agent to trusted personnel only and implement strict access controls and monitoring for suspicious activity. Employ host-based intrusion detection systems (HIDS) to detect unusual file access patterns indicative of path traversal exploitation. Regularly audit file permissions and system logs for anomalies. Additionally, consider isolating Control-M/Agent hosts in segmented network zones to limit lateral movement in case of compromise. Maintain up-to-date backups to enable recovery from potential attacks. Finally, educate system administrators about the risks of local privilege escalation vulnerabilities and the importance of timely patching.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- airbus
- Date Reserved
- 2025-08-07T07:24:22.470Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c958bfff7c553b3ddd1f26
Added to database: 9/16/2025, 12:31:59 PM
Last enriched: 2/27/2026, 3:46:18 AM
Last updated: 3/21/2026, 12:16:29 AM
Views: 102
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.