CVE-2025-55117: CWE-121 Stack-based Buffer Overflow in BMC Control-M/Agent
A stack-based buffer overflow can be remotely triggered when formatting an error message in the Control-M/Agent when SSL/TLS communication is configured. The issue occurs in the following cases: * Control-M/Agent 9.0.20: SSL/TLS configuration is set to the non-default setting "use_openssl=n"; * Control-M/Agent 9.0.21 and 9.0.22: Agent router configuration uses the non-default settings "JAVA_AR=N" and "use_openssl=n".
AI Analysis
Technical Summary
CVE-2025-55117 is a medium-severity stack-based buffer overflow vulnerability identified in BMC's Control-M/Agent software versions 9.0.18 through 9.0.22. This vulnerability arises specifically when the Control-M/Agent is configured to use SSL/TLS communication with certain non-default settings. In version 9.0.20, the issue manifests when the SSL/TLS configuration parameter "use_openssl" is set to "n" (disabling OpenSSL). For versions 9.0.21 and 9.0.22, the vulnerability is triggered when both "JAVA_AR" is set to "N" and "use_openssl" is set to "n" in the agent router configuration. The root cause is a stack-based buffer overflow that occurs during the formatting of an error message under these specific configurations. This overflow can be remotely triggered without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability impacts the confidentiality and integrity of the system with limited impact on availability. Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk due to its remote exploitability and the potential for arbitrary code execution or system compromise if successfully exploited. Control-M/Agent is widely used in enterprise environments for workload automation and job scheduling, making this vulnerability particularly relevant for organizations relying on these services for critical business processes. The absence of patches at the time of publication necessitates immediate attention to configuration and mitigation strategies to reduce exposure.
Potential Impact
For European organizations, the exploitation of CVE-2025-55117 could lead to unauthorized remote code execution or system compromise within critical workload automation environments. This can disrupt business operations, lead to data breaches, or allow attackers to pivot within internal networks. Given that Control-M/Agent is often integrated into enterprise IT infrastructure for scheduling and managing batch jobs, a successful attack could impact operational continuity, data integrity, and confidentiality of sensitive business information. The vulnerability's remote exploitability without authentication increases the risk profile, especially for organizations exposing Control-M/Agent interfaces to less trusted networks or the internet. Additionally, the specific configuration conditions required to trigger the vulnerability mean that organizations using non-default SSL/TLS settings are at higher risk, which may include those customizing security parameters for compliance or performance reasons. The lack of known exploits currently provides a window for proactive defense, but also indicates that attackers may develop exploits in the near future, increasing urgency for mitigation.
Mitigation Recommendations
European organizations should immediately audit their Control-M/Agent configurations to identify if the vulnerable versions (9.0.18 through 9.0.22) are in use and whether the non-default SSL/TLS settings "use_openssl=n" and "JAVA_AR=N" are applied. If these settings are in place, organizations should revert to default SSL/TLS configurations where feasible, particularly enabling OpenSSL usage (i.e., set "use_openssl=y") to mitigate the vulnerability. Network segmentation and strict access controls should be enforced to limit exposure of Control-M/Agent interfaces to trusted internal networks only. Employing intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics targeting anomalous Control-M/Agent traffic can help detect exploitation attempts. Organizations should monitor vendor communications closely for official patches or updates addressing this vulnerability and plan for rapid deployment once available. Additionally, implementing robust logging and alerting on Control-M/Agent error messages and unusual activity can provide early warning signs of exploitation attempts. Finally, conducting penetration testing and vulnerability assessments focused on Control-M/Agent configurations can help validate the effectiveness of mitigations.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-55117: CWE-121 Stack-based Buffer Overflow in BMC Control-M/Agent
Description
A stack-based buffer overflow can be remotely triggered when formatting an error message in the Control-M/Agent when SSL/TLS communication is configured. The issue occurs in the following cases: * Control-M/Agent 9.0.20: SSL/TLS configuration is set to the non-default setting "use_openssl=n"; * Control-M/Agent 9.0.21 and 9.0.22: Agent router configuration uses the non-default settings "JAVA_AR=N" and "use_openssl=n".
AI-Powered Analysis
Technical Analysis
CVE-2025-55117 is a medium-severity stack-based buffer overflow vulnerability identified in BMC's Control-M/Agent software versions 9.0.18 through 9.0.22. This vulnerability arises specifically when the Control-M/Agent is configured to use SSL/TLS communication with certain non-default settings. In version 9.0.20, the issue manifests when the SSL/TLS configuration parameter "use_openssl" is set to "n" (disabling OpenSSL). For versions 9.0.21 and 9.0.22, the vulnerability is triggered when both "JAVA_AR" is set to "N" and "use_openssl" is set to "n" in the agent router configuration. The root cause is a stack-based buffer overflow that occurs during the formatting of an error message under these specific configurations. This overflow can be remotely triggered without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability impacts the confidentiality and integrity of the system with limited impact on availability. Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk due to its remote exploitability and the potential for arbitrary code execution or system compromise if successfully exploited. Control-M/Agent is widely used in enterprise environments for workload automation and job scheduling, making this vulnerability particularly relevant for organizations relying on these services for critical business processes. The absence of patches at the time of publication necessitates immediate attention to configuration and mitigation strategies to reduce exposure.
Potential Impact
For European organizations, the exploitation of CVE-2025-55117 could lead to unauthorized remote code execution or system compromise within critical workload automation environments. This can disrupt business operations, lead to data breaches, or allow attackers to pivot within internal networks. Given that Control-M/Agent is often integrated into enterprise IT infrastructure for scheduling and managing batch jobs, a successful attack could impact operational continuity, data integrity, and confidentiality of sensitive business information. The vulnerability's remote exploitability without authentication increases the risk profile, especially for organizations exposing Control-M/Agent interfaces to less trusted networks or the internet. Additionally, the specific configuration conditions required to trigger the vulnerability mean that organizations using non-default SSL/TLS settings are at higher risk, which may include those customizing security parameters for compliance or performance reasons. The lack of known exploits currently provides a window for proactive defense, but also indicates that attackers may develop exploits in the near future, increasing urgency for mitigation.
Mitigation Recommendations
European organizations should immediately audit their Control-M/Agent configurations to identify if the vulnerable versions (9.0.18 through 9.0.22) are in use and whether the non-default SSL/TLS settings "use_openssl=n" and "JAVA_AR=N" are applied. If these settings are in place, organizations should revert to default SSL/TLS configurations where feasible, particularly enabling OpenSSL usage (i.e., set "use_openssl=y") to mitigate the vulnerability. Network segmentation and strict access controls should be enforced to limit exposure of Control-M/Agent interfaces to trusted internal networks only. Employing intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics targeting anomalous Control-M/Agent traffic can help detect exploitation attempts. Organizations should monitor vendor communications closely for official patches or updates addressing this vulnerability and plan for rapid deployment once available. Additionally, implementing robust logging and alerting on Control-M/Agent error messages and unusual activity can provide early warning signs of exploitation attempts. Finally, conducting penetration testing and vulnerability assessments focused on Control-M/Agent configurations can help validate the effectiveness of mitigations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- airbus
- Date Reserved
- 2025-08-07T07:24:22.470Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c958c0ff7c553b3ddd1f38
Added to database: 9/16/2025, 12:32:00 PM
Last enriched: 9/16/2025, 12:33:23 PM
Last updated: 10/31/2025, 6:14:36 AM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-58152: Files or directories accessible to external parties in Century Systems Co., Ltd. FutureNet MA-X series
MediumCVE-2025-54763: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Century Systems Co., Ltd. FutureNet MA-X series
HighCVE-2025-50739: n/a
UnknownCVE-2025-50736: n/a
UnknownCVE-2025-11975: CWE-862 Missing Authorization in fusewp FuseWP – WordPress User Sync to Email List & Marketing Automation (Mailchimp, Constant Contact, ActiveCampaign etc.)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.