CVE-2025-55112
BMC Control-M/Agent hardcoded Blowfish keys
CVSS Score
7.4
EPSS Score
0.0%
EPSS Percentile
0th
Out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 (and potentially earlier unsupported versions) that are configured to use the non-default Blowfish cryptography algorithm use a hardcoded key. An attacker with access to network traffic and to this key could decrypt network traffic between the Control-M/Agent and Server.
| CWE | CWE-321 CWE-327 |
| Vendor | bmc |
| Product | control-m/agent |
| Published | Sep 16, 2025 |
| Last Updated | Feb 26, 2026 |
Stay Ahead of the Next One
Get instant alerts for bmc control-m/agent
Be the first to know when new high vulnerabilities affecting bmc control-m/agent are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Affected Versions
BMC / Control-M/Agent
9.0.20 9.0.19 9.0.18
References
Credits
Airbus SAS - Jean-Romain Garnier - [email protected]