Bmc

Control-m/agent

11 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.42%
  • Veröffentlicht 05.11.2025 09:15:32
  • Zuletzt bearbeitet 18.11.2025 15:16:31

The Control-M/Agent is vulnerable to unauthenticated remote code execution, arbitrary file read and write and similar unauthorized actions when mutual SSL/TLS authentication is not enabled (i.e. in the default configuration). NOTE:  * The vendo...

  • EPSS 0.06%
  • Veröffentlicht 16.09.2025 12:23:39
  • Zuletzt bearbeitet 18.11.2025 15:16:31

Memory corruptions can be remotely triggered in the Control-M/Agent when SSL/TLS communication is configured. The issue occurs in the following cases: * Control-M/Agent 9.0.20: SSL/TLS configuration is set to the non-default setting "use_openss...

  • EPSS 0.05%
  • Veröffentlicht 16.09.2025 12:22:58
  • Zuletzt bearbeitet 10.10.2025 14:12:25

A stack-based buffer overflow can be remotely triggered when formatting an error message in the Control-M/Agent when SSL/TLS communication is configured. The issue occurs in the following cases: * Control-M/Agent 9.0.20: SSL/TLS configuration i...

  • EPSS 0.02%
  • Veröffentlicht 16.09.2025 12:22:23
  • Zuletzt bearbeitet 10.10.2025 14:10:51

A buffer overflow in the Control-M/Agent can lead to a local privilege escalation when an attacker has access to the system running the Agent. This vulnerability impacts the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially ea...

  • EPSS 0.02%
  • Veröffentlicht 16.09.2025 12:21:51
  • Zuletzt bearbeitet 10.10.2025 14:10:38

A path traversal in the Control-M/Agent can lead to a local privilege escalation when an attacker has access to the system running the Agent. This vulnerability impacts the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earl...

  • EPSS 0.06%
  • Veröffentlicht 16.09.2025 12:20:30
  • Zuletzt bearbeitet 17.09.2025 14:18:55

The improper order of AUTHORIZED_CTM_IP validation in the Control-M/Agent, where the Control-M/Server IP address is validated only after the SSL/TLS handshake is completed, exposes the Control-M/Agent to vulnerabilities in the SSL/TLS implementation ...

  • EPSS 0.06%
  • Veröffentlicht 16.09.2025 12:20:03
  • Zuletzt bearbeitet 10.10.2025 14:08:43

If the Access Control List is enforced by the Control-M/Agent and the C router is in use (default in Out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions; non-default but configurable using the JAVA_AR...

  • EPSS 0.02%
  • Veröffentlicht 16.09.2025 12:19:24
  • Zuletzt bearbeitet 10.10.2025 14:01:21

Out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 (and potentially earlier unsupported versions) that are configured to use the non-default Blowfish cryptography algorithm use a hardcoded key. An attacker with access to network traffic and to ...

  • EPSS 0.01%
  • Veröffentlicht 16.09.2025 12:18:22
  • Zuletzt bearbeitet 29.09.2025 12:08:29

Certain files with overly permissive permissions were identified in the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions as well as in newer versions which were upgraded from an affected version. T...

  • EPSS 0.02%
  • Veröffentlicht 16.09.2025 12:16:57
  • Zuletzt bearbeitet 17.09.2025 14:18:55

Control-M/Agents use a kdb or PKCS#12 keystore by default, and the default keystore password is well known and documented. An attacker with read access to the keystore could access sensitive data using this password.