CVE-2025-55117

A stack-based buffer overflow can be remotely triggered when formatting an error message in the Control-M/Agent when SSL/TLS communication is configured. The issue occurs in the following cases: * Control-M/Agent 9.0.20: SSL/TLS configuration is set to the non-default setting "use_openssl=n"; * Control-M/Agent 9.0.21 and 9.0.22: Agent router configuration uses the non-default settings "JAVA_AR=N" and "use_openssl=n".
Configurations

Configuration 1 (hide)

cpe:2.3:a:bmc:control-m\/agent:*:*:*:*:*:*:*:*

History

10 Oct 2025, 14:12

Type Values Removed Values Added
References () https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000441972 - () https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000441972 - Vendor Advisory, Mitigation
References () https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000442099 - () https://bmcapps.my.site.com/casemgmt/sc_KnowledgeArticle?sfdcid=000442099 - Vendor Advisory
First Time Bmc
Bmc control-m\/agent
CPE cpe:2.3:a:bmc:control-m\/agent:*:*:*:*:*:*:*:*

16 Sep 2025, 13:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-16 13:16

Updated : 2025-10-10 14:12


NVD link : CVE-2025-55117

Mitre link : CVE-2025-55117

CVE.ORG link : CVE-2025-55117


JSON object : View

Products Affected

bmc

  • control-m\/agent
CWE
CWE-121

Stack-based Buffer Overflow