Control-M/Agents use a kdb or PKCS#12 keystore by default, and the default keystore password is well known and documented. An attacker with read access to the keystore could access sensitive data using this password.
History

Wed, 17 Sep 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Bmc
Bmc control-m/agent
Vendors & Products Bmc
Bmc control-m/agent

Tue, 16 Sep 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 16 Sep 2025 12:45:00 +0000

Type Values Removed Values Added
Description Control-M/Agents use a kdb or PKCS#12 keystore by default, and the default keystore password is well known and documented. An attacker with read access to the keystore could access sensitive data using this password.
Title BMC Control-M/Agent hardcoded default keystore password
Weaknesses CWE-1392
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 5.7, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: airbus

Published: 2025-09-16T12:16:57.669Z

Updated: 2025-09-16T18:29:54.062Z

Reserved: 2025-08-07T07:23:59.125Z

Link: CVE-2025-55110

cve-icon Vulnrichment

Updated: 2025-09-16T18:29:49.793Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-16T13:16:04.980

Modified: 2025-09-17T14:18:55.093

Link: CVE-2025-55110

cve-icon Redhat

No data.