An authentication bypass vulnerability exists in the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions when using an empty or default kdb keystore or a default PKCS#12 keystore. A remote attacker with access to a signed third-party or demo certificate for client authentication can bypass the need for a certificate signed by the certificate authority of the organization during authentication on the Control-M/Agent.
The Control-M/Agent contains hardcoded certificates which are only trusted as fallback if an empty kdb keystore is used; they are never trusted if a PKCS#12 keystore is used. All of these certificates are now expired.
In addition, the Control-M/Agent default kdb and PKCS#12 keystores contain trusted third-party certificates (external recognized CAs and default self-signed demo certificates) which are trusted for client authentication.
References
Link | Resource |
---|---|
https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000441963 | Vendor Advisory |
https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000442099 | Vendor Advisory |
Configurations
History
10 Oct 2025, 14:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000441963 - Vendor Advisory | |
References | () https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000442099 - Vendor Advisory | |
First Time |
Bmc
Bmc control-m\/agent |
|
CPE | cpe:2.3:a:bmc:control-m\/agent:*:*:*:*:*:*:*:* |
16 Sep 2025, 13:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-16 13:16
Updated : 2025-10-10 14:16
NVD link : CVE-2025-55109
Mitre link : CVE-2025-55109
CVE.ORG link : CVE-2025-55109
JSON object : View
Products Affected
bmc
- control-m\/agent
CWE
CWE-295
Improper Certificate Validation