Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55117: CWE-121 Stack-based Buffer Overflow in BMC Control-M/Agent

0
Medium
VulnerabilityCVE-2025-55117cvecve-2025-55117cwe-121
Published: Tue Sep 16 2025 (09/16/2025, 12:22:58 UTC)
Source: CVE Database V5
Vendor/Project: BMC
Product: Control-M/Agent

Description

A stack-based buffer overflow can be remotely triggered when formatting an error message in the Control-M/Agent when SSL/TLS communication is configured. The issue occurs in the following cases: * Control-M/Agent 9.0.20: SSL/TLS configuration is set to the non-default setting "use_openssl=n"; * Control-M/Agent 9.0.21 and 9.0.22: Agent router configuration uses the non-default settings "JAVA_AR=N" and "use_openssl=n".

AI-Powered Analysis

AILast updated: 09/16/2025, 12:33:23 UTC

Technical Analysis

CVE-2025-55117 is a medium-severity stack-based buffer overflow vulnerability identified in BMC's Control-M/Agent software versions 9.0.18 through 9.0.22. This vulnerability arises specifically when the Control-M/Agent is configured to use SSL/TLS communication with certain non-default settings. In version 9.0.20, the issue manifests when the SSL/TLS configuration parameter "use_openssl" is set to "n" (disabling OpenSSL). For versions 9.0.21 and 9.0.22, the vulnerability is triggered when both "JAVA_AR" is set to "N" and "use_openssl" is set to "n" in the agent router configuration. The root cause is a stack-based buffer overflow that occurs during the formatting of an error message under these specific configurations. This overflow can be remotely triggered without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability impacts the confidentiality and integrity of the system with limited impact on availability. Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk due to its remote exploitability and the potential for arbitrary code execution or system compromise if successfully exploited. Control-M/Agent is widely used in enterprise environments for workload automation and job scheduling, making this vulnerability particularly relevant for organizations relying on these services for critical business processes. The absence of patches at the time of publication necessitates immediate attention to configuration and mitigation strategies to reduce exposure.

Potential Impact

For European organizations, the exploitation of CVE-2025-55117 could lead to unauthorized remote code execution or system compromise within critical workload automation environments. This can disrupt business operations, lead to data breaches, or allow attackers to pivot within internal networks. Given that Control-M/Agent is often integrated into enterprise IT infrastructure for scheduling and managing batch jobs, a successful attack could impact operational continuity, data integrity, and confidentiality of sensitive business information. The vulnerability's remote exploitability without authentication increases the risk profile, especially for organizations exposing Control-M/Agent interfaces to less trusted networks or the internet. Additionally, the specific configuration conditions required to trigger the vulnerability mean that organizations using non-default SSL/TLS settings are at higher risk, which may include those customizing security parameters for compliance or performance reasons. The lack of known exploits currently provides a window for proactive defense, but also indicates that attackers may develop exploits in the near future, increasing urgency for mitigation.

Mitigation Recommendations

European organizations should immediately audit their Control-M/Agent configurations to identify if the vulnerable versions (9.0.18 through 9.0.22) are in use and whether the non-default SSL/TLS settings "use_openssl=n" and "JAVA_AR=N" are applied. If these settings are in place, organizations should revert to default SSL/TLS configurations where feasible, particularly enabling OpenSSL usage (i.e., set "use_openssl=y") to mitigate the vulnerability. Network segmentation and strict access controls should be enforced to limit exposure of Control-M/Agent interfaces to trusted internal networks only. Employing intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics targeting anomalous Control-M/Agent traffic can help detect exploitation attempts. Organizations should monitor vendor communications closely for official patches or updates addressing this vulnerability and plan for rapid deployment once available. Additionally, implementing robust logging and alerting on Control-M/Agent error messages and unusual activity can provide early warning signs of exploitation attempts. Finally, conducting penetration testing and vulnerability assessments focused on Control-M/Agent configurations can help validate the effectiveness of mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
airbus
Date Reserved
2025-08-07T07:24:22.470Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c958c0ff7c553b3ddd1f38

Added to database: 9/16/2025, 12:32:00 PM

Last enriched: 9/16/2025, 12:33:23 PM

Last updated: 10/31/2025, 6:14:36 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats