NOTE: The vendor believes that this vulnerability only occurs when documented security best practices are not followed. BMC has always strongly recommended to use security best practices such as configuring SSL/TLS between Control-M Server and Agent.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 05 Nov 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 05 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Control-M/Agent is vulnerable to unauthenticated remote code execution, arbitrary file read and write and similar unauthorized actions when mutual SSL/TLS authentication is not enabled (i.e. in the default configuration). NOTE: The vendor believes that this vulnerability only occurs when documented security best practices are not followed. BMC has always strongly recommended to use security best practices such as configuring SSL/TLS between Control-M Server and Agent. | |
| Title | BMC Control-M/Agent default configuration does not enforce SSL/TLS allowing unauthorized actions and remote code execution | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: airbus
Published:
Updated: 2025-11-05T14:07:48.821Z
Reserved: 2025-08-07T07:23:59.124Z
Link: CVE-2025-55108
Updated: 2025-11-05T14:07:45.998Z
Status : Received
Published: 2025-11-05T09:15:32.170
Modified: 2025-11-05T09:15:32.170
Link: CVE-2025-55108
No data.
OpenCVE Enrichment
No data.