CVE-2025-55118

8.9 HIGH

📋 TL;DR

A heap-based buffer overflow vulnerability in BMC Control-M/Agent allows remote attackers to trigger memory corruption via SSL/TLS communication. This affects Control-M/Agent versions 9.0.20-9.0.22 with specific non-default SSL/TLS configurations. Successful exploitation could lead to remote code execution or denial of service.

💻 Affected Systems

Products:
  • BMC Control-M/Agent
Versions: 9.0.20, 9.0.21, 9.0.22
Operating Systems: All supported platforms
Default Config Vulnerable: ✅ No
Notes: Only vulnerable with specific non-default configurations: 9.0.20 requires 'use_openssl=n'; 9.0.21-9.0.22 require both 'JAVA_AR=N' and 'use_openssl=n'

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with SYSTEM/root privileges leading to complete system compromise

🟠

Likely Case

Denial of service causing agent crashes and workflow disruption

🟢

If Mitigated

Limited impact due to non-default configuration requirement

🌐 Internet-Facing: HIGH if exposed with vulnerable configuration
🏢 Internal Only: MEDIUM due to non-default configuration requirement

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires specific non-default configuration and SSL/TLS communication to trigger

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.0.23 or later

Vendor Advisory: https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000441972

Restart Required: Yes

Instructions:

1. Download Control-M/Agent 9.0.23 or later from BMC support portal. 2. Backup current configuration. 3. Install the updated version following BMC's upgrade procedures. 4. Restart the Control-M/Agent service.

🔧 Temporary Workarounds

Revert to default SSL/TLS configuration

all

Change SSL/TLS configuration to use default OpenSSL settings instead of non-default configuration

Edit agent configuration file to set use_openssl=y and JAVA_AR=Y (for 9.0.21-9.0.22)

Restrict network access

all

Limit network access to Control-M/Agent to trusted sources only

Configure firewall rules to restrict access to Control-M/Agent ports (typically 7005-7010)

🧯 If You Can't Patch

  • Immediately revert to default SSL/TLS configuration (use_openssl=y, JAVA_AR=Y)
  • Implement strict network segmentation and firewall rules to limit agent exposure

🔍 How to Verify

Check if Vulnerable:

Check Control-M/Agent version and configuration: version must be 9.0.20-9.0.22 AND configuration must have use_openssl=n (and JAVA_AR=N for 9.0.21-9.0.22)

Check Version:

ctmagent -version or check agent installation directory for version file

Verify Fix Applied:

Verify version is 9.0.23 or later, or configuration has been changed to use_openssl=y (and JAVA_AR=Y for 9.0.21-9.0.22)

📡 Detection & Monitoring

Log Indicators:

  • Unexpected agent crashes
  • Memory access violation errors in agent logs
  • SSL/TLS handshake failures

Network Indicators:

  • Unusual SSL/TLS traffic patterns to agent ports
  • Connection attempts with malformed SSL/TLS packets

SIEM Query:

source="control-m-agent" AND (event_type="crash" OR error="memory" OR error="buffer")

🔗 References

📤 Share & Export