CVE-2025-55109

An authentication bypass vulnerability exists in the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions when using an empty or default kdb keystore or a default PKCS#12 keystore. A remote attacker with access to a signed third-party or demo certificate for client authentication can bypass the need for a certificate signed by the certificate authority of the organization during authentication on the Control-M/Agent. The Control-M/Agent contains hardcoded certificates which are only trusted as fallback if an empty kdb keystore is used; they are never trusted if a PKCS#12 keystore is used. All of these certificates are now expired. In addition, the Control-M/Agent default kdb and PKCS#12 keystores contain trusted third-party certificates (external recognized CAs and default self-signed demo certificates) which are trusted for client authentication.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bmc:control-m\/agent:*:*:*:*:*:*:*:*

History

10 Oct 2025, 14:16

Type Values Removed Values Added
References () https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000441963 - () https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000441963 - Vendor Advisory
References () https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000442099 - () https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000442099 - Vendor Advisory
First Time Bmc
Bmc control-m\/agent
CPE cpe:2.3:a:bmc:control-m\/agent:*:*:*:*:*:*:*:*

16 Sep 2025, 13:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-16 13:16

Updated : 2025-10-10 14:16


NVD link : CVE-2025-55109

Mitre link : CVE-2025-55109

CVE.ORG link : CVE-2025-55109


JSON object : View

Products Affected

bmc

  • control-m\/agent
CWE
CWE-295

Improper Certificate Validation