Out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 (and potentially earlier unsupported versions) that are configured to use the non-default Blowfish cryptography algorithm use a hardcoded key. An attacker with access to network traffic and to this key could decrypt network traffic between the Control-M/Agent and Server.
References
| Link | Resource |
|---|---|
| https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000441966 | Vendor Advisory |
| https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000442099 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-09-16 13:16
Updated : 2025-10-10 14:01
NVD link : CVE-2025-55112
Mitre link : CVE-2025-55112
CVE.ORG link : CVE-2025-55112
JSON object : View
Products Affected
bmc
- control-m\/agent
