Out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 (and potentially earlier unsupported versions) that are configured to use the non-default Blowfish cryptography algorithm use a hardcoded key. An attacker with access to network traffic and to this key could decrypt network traffic between the Control-M/Agent and Server.
References
| Link | Resource |
|---|---|
| https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000441966 | Vendor Advisory |
| https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000442099 | Vendor Advisory |
Configurations
History
10 Oct 2025, 14:01
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:bmc:control-m\/agent:*:*:*:*:*:*:*:* | |
| First Time |
Bmc control-m\/agent
Bmc |
|
| References | () https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000441966 - Vendor Advisory | |
| References | () https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000442099 - Vendor Advisory |
16 Sep 2025, 13:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-16 13:16
Updated : 2025-10-10 14:01
NVD link : CVE-2025-55112
Mitre link : CVE-2025-55112
CVE.ORG link : CVE-2025-55112
JSON object : View
Products Affected
bmc
- control-m\/agent
