Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p7ww-wjh2-g3gw

Опубликовано: 05 нояб. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.5
CVSS3: 10

Описание

The Control-M/Agent is vulnerable to unauthenticated remote code execution, arbitrary file read and write and similar unauthorized actions when mutual SSL/TLS authentication is not enabled (i.e. in the default configuration).

NOTE: The vendor believes that this vulnerability only occurs when documented security best practices are not followed. BMC has always strongly recommended to use security best practices such as configuring SSL/TLS between Control-M Server and Agent.

The Control-M/Agent is vulnerable to unauthenticated remote code execution, arbitrary file read and write and similar unauthorized actions when mutual SSL/TLS authentication is not enabled (i.e. in the default configuration).

NOTE: The vendor believes that this vulnerability only occurs when documented security best practices are not followed. BMC has always strongly recommended to use security best practices such as configuring SSL/TLS between Control-M Server and Agent.

EPSS

Процентиль: 62%
0.00433
Низкий

9.5 Critical

CVSS4

10 Critical

CVSS3

Дефекты

CWE-306

Связанные уязвимости

CVSS3: 10
nvd
3 месяца назад

The Control-M/Agent is vulnerable to unauthenticated remote code execution, arbitrary file read and write and similar unauthorized actions when mutual SSL/TLS authentication is not enabled (i.e. in the default configuration). NOTE:  * The vendor believes that this vulnerability only occurs when documented security best practices are not followed. BMC has always strongly recommended to use security best practices such as configuring SSL/TLS between Control-M Server and Agent. * The vendor notifies that Control-M/Agent is not impacted in Control-M SaaS

EPSS

Процентиль: 62%
0.00433
Низкий

9.5 Critical

CVSS4

10 Critical

CVSS3

Дефекты

CWE-306