BMC Control-M/Server 9.0.21.300 displays cleartext database credentials in process lists and logs. An authenticated attacker with shell access could observe these credentials and use them to log in to the database server. For example, when Control-M/Server on Windows has a database connection on, it runs 'DBUStatus.exe' frequently, which then calls 'dbu_connection_details.vbs' with the username, password, database hostname, and port written in cleartext, which can be seen in event and process logs in two separate locations. Fixed in PACTV.9.0.21.307.
References
Configurations
No configuration.
History
01 Dec 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-214 | |
| Summary | (en) BMC Control-M/Server 9.0.21.300 displays cleartext database credentials in process lists and logs. An authenticated attacker with shell access could observe these credentials and use them to log in to the database server. For example, when Control-M/Server on Windows has a database connection on, it runs 'DBUStatus.exe' frequently, which then calls 'dbu_connection_details.vbs' with the username, password, database hostname, and port written in cleartext, which can be seen in event and process logs in two separate locations. Fixed in PACTV.9.0.21.307. | |
| References |
|
|
| References | () https://docs.bmc.com/xwiki/bin/view/Control-M-Orchestration/Control-M/ctm9021/Patches/Control-M-Server-PACTV-9-0-21-307/ - |
Information
Published : 2025-08-07 20:15
Updated : 2025-12-01 22:15
NVD link : CVE-2025-48709
Mitre link : CVE-2025-48709
CVE.ORG link : CVE-2025-48709
JSON object : View
Products Affected
No product.
