- EPSS 0.42%
- Veröffentlicht 05.11.2025 09:15:32
- Zuletzt bearbeitet 18.11.2025 15:16:31
The Control-M/Agent is vulnerable to unauthenticated remote code execution, arbitrary file read and write and similar unauthorized actions when mutual SSL/TLS authentication is not enabled (i.e. in the default configuration). NOTE: * The vendo...
CVE-2025-55118
- EPSS 0.06%
- Veröffentlicht 16.09.2025 12:23:39
- Zuletzt bearbeitet 18.11.2025 15:16:31
Memory corruptions can be remotely triggered in the Control-M/Agent when SSL/TLS communication is configured. The issue occurs in the following cases: * Control-M/Agent 9.0.20: SSL/TLS configuration is set to the non-default setting "use_openss...
CVE-2025-55117
- EPSS 0.05%
- Veröffentlicht 16.09.2025 12:22:58
- Zuletzt bearbeitet 10.10.2025 14:12:25
A stack-based buffer overflow can be remotely triggered when formatting an error message in the Control-M/Agent when SSL/TLS communication is configured. The issue occurs in the following cases: * Control-M/Agent 9.0.20: SSL/TLS configuration i...
CVE-2025-55116
- EPSS 0.02%
- Veröffentlicht 16.09.2025 12:22:23
- Zuletzt bearbeitet 10.10.2025 14:10:51
A buffer overflow in the Control-M/Agent can lead to a local privilege escalation when an attacker has access to the system running the Agent. This vulnerability impacts the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially ea...
CVE-2025-55115
- EPSS 0.02%
- Veröffentlicht 16.09.2025 12:21:51
- Zuletzt bearbeitet 10.10.2025 14:10:38
A path traversal in the Control-M/Agent can lead to a local privilege escalation when an attacker has access to the system running the Agent. This vulnerability impacts the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earl...
CVE-2025-55114
- EPSS 0.06%
- Veröffentlicht 16.09.2025 12:20:30
- Zuletzt bearbeitet 17.09.2025 14:18:55
The improper order of AUTHORIZED_CTM_IP validation in the Control-M/Agent, where the Control-M/Server IP address is validated only after the SSL/TLS handshake is completed, exposes the Control-M/Agent to vulnerabilities in the SSL/TLS implementation ...
- EPSS 0.06%
- Veröffentlicht 16.09.2025 12:20:03
- Zuletzt bearbeitet 10.10.2025 14:08:43
If the Access Control List is enforced by the Control-M/Agent and the C router is in use (default in Out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions; non-default but configurable using the JAVA_AR...
CVE-2025-55112
- EPSS 0.02%
- Veröffentlicht 16.09.2025 12:19:24
- Zuletzt bearbeitet 10.10.2025 14:01:21
Out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 (and potentially earlier unsupported versions) that are configured to use the non-default Blowfish cryptography algorithm use a hardcoded key. An attacker with access to network traffic and to ...
CVE-2025-55111
- EPSS 0.01%
- Veröffentlicht 16.09.2025 12:18:22
- Zuletzt bearbeitet 29.09.2025 12:08:29
Certain files with overly permissive permissions were identified in the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions as well as in newer versions which were upgraded from an affected version. T...
CVE-2025-55110
- EPSS 0.02%
- Veröffentlicht 16.09.2025 12:16:57
- Zuletzt bearbeitet 17.09.2025 14:18:55
Control-M/Agents use a kdb or PKCS#12 keystore by default, and the default keystore password is well known and documented. An attacker with read access to the keystore could access sensitive data using this password.