Home

Description

A stack-based buffer overflow can be remotely triggered when formatting an error message in the Control-M/Agent when SSL/TLS communication is configured. The issue occurs in the following cases: * Control-M/Agent 9.0.20: SSL/TLS configuration is set to the non-default setting "use_openssl=n"; * Control-M/Agent 9.0.21 and 9.0.22: Agent router configuration uses the non-default settings "JAVA_AR=N" and "use_openssl=n".

PUBLISHED Reserved 2025-08-07 | Published 2025-09-16 | Updated 2025-09-16 | Assigner airbus




MEDIUM: 6.3CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-121 Stack-based Buffer Overflow

Product status

Default status
affected

9.0.22.000 (semver)
affected

9.0.21 (semver)
affected

9.0.20 (semver)
affected

9.0.19 (semver)
affected

9.0.18 (semver)
affected

Credits

Airbus SAS - Jean-Romain Garnier - seclab@airbus.com finder

References

bmcapps.my.site.com/.../sc_KnowledgeArticle?sfdcid=000442099 vendor-advisory

bmcapps.my.site.com/.../sc_KnowledgeArticle?sfdcid=000441972 mitigation

cve.org (CVE-2025-55117)

nvd.nist.gov (CVE-2025-55117)

Download JSON