CVE-2025-55112
📋 TL;DR
CVE-2025-55112 allows attackers to decrypt network traffic between Control-M/Agent and Server when Blowfish encryption is configured, due to a hardcoded cryptographic key. This affects organizations using out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 (and potentially earlier unsupported versions) with non-default Blowfish configuration.
💻 Affected Systems
- BMC Control-M/Agent
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of sensitive job data, credentials, and business logic transmitted between Control-M components, potentially enabling lateral movement within the environment.
Likely Case
Exfiltration of job execution details, configuration data, and potentially credentials from intercepted network traffic.
If Mitigated
Limited impact if Blowfish is not used or network segmentation prevents traffic interception.
🎯 Exploit Status
Requires network access to intercept traffic and knowledge of the hardcoded key. No authentication bypass needed for decryption once traffic is captured.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: N/A - Affected versions are out of support
Vendor Advisory: https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000441966
Restart Required: Yes
Instructions:
1. Upgrade to supported Control-M versions (9.0.21+ or current supported release). 2. If upgrade not possible, switch encryption algorithm from Blowfish to AES. 3. Restart Control-M/Agent services.
🔧 Temporary Workarounds
Disable Blowfish Encryption
allChange encryption algorithm from Blowfish to AES in Control-M configuration
Edit Control-M configuration files to set encryption_algorithm=AES
Restart Control-M/Agent service
Network Segmentation
allIsolate Control-M traffic to prevent interception
Implement VLAN segmentation
Use IPSec tunnels between Control-M components
🧯 If You Can't Patch
- Immediately switch from Blowfish to AES encryption algorithm
- Implement strict network segmentation and monitor for traffic interception attempts
🔍 How to Verify
Check if Vulnerable:
Check Control-M/Agent configuration files for encryption_algorithm=Blowfish setting and verify version is 9.0.18-9.0.20
Check Version:
ctmagent -version or check agent version in Control-M/Enterprise Manager
Verify Fix Applied:
Confirm encryption_algorithm is set to AES (not Blowfish) and version is upgraded to 9.0.21+
📡 Detection & Monitoring
Log Indicators:
- Configuration changes to encryption settings
- Unexpected network connections to Control-M ports
Network Indicators:
- Unencrypted or weakly encrypted traffic on Control-M ports (default 7005-7006)
- Network sniffing tools on Control-M network segments
SIEM Query:
source="control-m" AND (event="configuration_change" OR "encryption_algorithm") OR dest_port IN (7005, 7006) AND protocol="TCP"