Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55116: CWE-121 Stack-based Buffer Overflow in BMC Control-M/Agent

0
Critical
VulnerabilityCVE-2025-55116cvecve-2025-55116cwe-121
Published: Tue Sep 16 2025 (09/16/2025, 12:22:23 UTC)
Source: CVE Database V5
Vendor/Project: BMC
Product: Control-M/Agent

Description

A buffer overflow in the Control-M/Agent can lead to a local privilege escalation when an attacker has access to the system running the Agent. This vulnerability impacts the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 03:46:35 UTC

Technical Analysis

CVE-2025-55116 is a stack-based buffer overflow vulnerability identified in BMC's Control-M/Agent software, specifically affecting versions 9.0.18 through 9.0.20 and potentially earlier unsupported releases. Control-M/Agent is a widely used workload automation and job scheduling agent deployed in enterprise environments to manage batch jobs and workflows. The vulnerability arises from improper bounds checking on stack buffers, allowing an attacker with local access to the system to overwrite memory on the stack. This can lead to arbitrary code execution with elevated privileges, effectively enabling local privilege escalation. The attacker must have at least low-level privileges on the host to exploit the flaw, but no user interaction is required. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow), a common and dangerous software weakness. The CVSS 4.0 base score is 9.3, reflecting critical severity due to the high impact on confidentiality, integrity, and availability, combined with relatively low attack complexity and no need for user interaction. The affected versions are out of official support, complicating mitigation efforts. No patches or vendor-provided fixes are currently available, and no active exploitation has been reported. This vulnerability poses a significant risk to organizations relying on Control-M/Agent for critical automation tasks, as successful exploitation could allow attackers to gain unauthorized administrative control over affected systems.

Potential Impact

The impact of CVE-2025-55116 is substantial for organizations worldwide using the affected Control-M/Agent versions. Successful exploitation allows local attackers to escalate privileges, potentially gaining full administrative control over the host system. This can lead to unauthorized access to sensitive data, disruption of automated workflows, and compromise of system integrity and availability. Given Control-M/Agent's role in managing critical batch jobs and enterprise workflows, exploitation could disrupt business operations, cause data loss or corruption, and facilitate further lateral movement within networks. The vulnerability's critical severity and high CVSS score indicate that the risk extends beyond isolated incidents, potentially affecting entire IT environments. Organizations running unsupported versions face additional challenges due to lack of official patches, increasing the window of exposure. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for remediation, as attackers may develop exploits rapidly once details become widely known.

Mitigation Recommendations

To mitigate CVE-2025-55116, organizations should prioritize upgrading to the latest supported versions of BMC Control-M/Agent where the vulnerability is addressed. If immediate upgrade is not feasible, implement strict access controls to limit local system access only to trusted administrators and users. Employ host-based intrusion detection systems (HIDS) and endpoint protection solutions to monitor for anomalous behavior indicative of exploitation attempts. Conduct thorough audits of user privileges and remove unnecessary local accounts or restrict their permissions. Network segmentation can reduce the risk of lateral movement if a system is compromised. Additionally, maintain comprehensive logging and regularly review logs for suspicious activity related to Control-M/Agent processes. Engage with BMC support or security advisories for any interim patches or workarounds. Finally, educate system administrators about the risks of running unsupported software versions and the importance of timely patch management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
airbus
Date Reserved
2025-08-07T07:24:22.470Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c958bfff7c553b3ddd1f2a

Added to database: 9/16/2025, 12:31:59 PM

Last enriched: 2/27/2026, 3:46:35 AM

Last updated: 3/25/2026, 6:47:53 AM

Views: 111

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses