CVE-2025-55117
📋 TL;DR
A stack-based buffer overflow vulnerability in Control-M/Agent allows remote attackers to potentially execute arbitrary code or crash the service when SSL/TLS communication is configured with specific non-default settings. This affects Control-M/Agent versions 9.0.20-9.0.22 with particular configuration combinations. Organizations using these versions with non-default SSL/TLS settings are at risk.
💻 Affected Systems
- BMC Control-M/Agent
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data theft, or lateral movement within the network.
Likely Case
Service crash causing denial of service and disruption of Control-M automation workflows.
If Mitigated
Limited impact due to non-default configuration requirements and network segmentation.
🎯 Exploit Status
Exploitation requires specific non-default configurations and triggering error conditions during SSL/TLS communication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 9.0.23 or later
Vendor Advisory: https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000441972
Restart Required: Yes
Instructions:
1. Download Control-M/Agent 9.0.23 or later from BMC support portal. 2. Backup current configuration. 3. Install the updated version following BMC's upgrade procedures. 4. Restart the Control-M/Agent service.
🔧 Temporary Workarounds
Disable vulnerable SSL/TLS configurations
allChange SSL/TLS configuration to use default settings or secure alternatives
Edit agent configuration to set use_openssl=y (default)
For 9.0.21-9.0.22: Also set JAVA_AR=Y (default)
🧯 If You Can't Patch
- Implement network segmentation to restrict access to Control-M/Agent ports
- Monitor for unusual traffic patterns or connection attempts to Control-M/Agent services
🔍 How to Verify
Check if Vulnerable:
Check Control-M/Agent version and configuration: 1. Verify version is 9.0.20, 9.0.21, or 9.0.22. 2. Check if use_openssl=n is set. 3. For 9.0.21-9.0.22, check if JAVA_AR=N is also set.
Check Version:
ctmagent -v or check agent installation directory version files
Verify Fix Applied:
1. Confirm Control-M/Agent version is 9.0.23 or later. 2. Verify SSL/TLS communication functions normally. 3. Test error handling during SSL/TLS operations.
📡 Detection & Monitoring
Log Indicators:
- Multiple SSL/TLS handshake failures
- Stack overflow or memory violation errors in agent logs
- Unexpected agent restarts or crashes
Network Indicators:
- Unusual traffic patterns to Control-M/Agent ports (typically 7005-7006)
- Multiple failed SSL/TLS connections from single sources
SIEM Query:
source="control-m-agent" AND ("SSL error" OR "buffer overflow" OR "segmentation fault")