Access Control Bypass in Control-M/Agent by BMC Software
CVE-2025-55113

9.5CRITICAL

Key Information:

Vendor

Bmc

Vendor
CVE Published:
16 September 2025

What is CVE-2025-55113?

A vulnerability exists in the Control-M/Agent where the Access Control List (ACL) enforcement can be bypassed if the C router is in use. This issue primarily affects earlier versions of Control-M/Agent, such as 9.0.18 to 9.0.20, or even earlier unsupported versions. When a client certificate's email address contains a NULL byte, the verification process terminates prematurely, allowing an attacker to exploit this flaw by presenting a specially crafted certificate to bypass the defined ACLs.

Affected Version(s)

Control-M/Agent 9.0.22.000

Control-M/Agent 9.0.22.000

Control-M/Agent 9.0.21

References

CVSS V4

Score:
9.5
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Airbus SAS - Jean-Romain Garnier - [email protected]
.
CVE-2025-55113 : Access Control Bypass in Control-M/Agent by BMC Software