๐Ÿ” CVE Alert

CVE-2025-55109

CRITICAL 9.0

BMC Control-M/Agent default SSL/TLS configuration authenticated bypass

CVSS Score
9.0
EPSS Score
0.0%
EPSS Percentile
0th

An authentication bypass vulnerability exists in the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions when using an empty or default kdb keystore or a default PKCS#12 keystore. A remote attacker with access to a signed third-party or demo certificate for client authentication can bypass the need for a certificate signed by the certificate authority of the organization during authentication on the Control-M/Agent. The Control-M/Agent contains hardcoded certificates which are only trusted as fallback if an empty kdb keystore is used; they are never trusted if a PKCS#12 keystore is used. All of these certificates are now expired. In addition, the Control-M/Agent default kdb and PKCS#12 keystores contain trusted third-party certificates (external recognized CAs and default self-signed demo certificates) which are trusted for client authentication.

CWE CWE-295
Vendor bmc
Product control-m/agent
Published Sep 16, 2025
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for bmc control-m/agent

Be the first to know when new critical vulnerabilities affecting bmc control-m/agent are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

BMC / Control-M/Agent
9.0.20 9.0.19 9.0.18

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
bmcapps.my.site.com: https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000442099 bmcapps.my.site.com: https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000441963

Credits

Airbus SAS - Jean-Romain Garnier - [email protected]