Логотип exploitDog
bind:CVE-2025-55112
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-55112

Количество 2

Количество 2

nvd логотип

CVE-2025-55112

5 месяцев назад

Out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 (and potentially earlier unsupported versions) that are configured to use the non-default Blowfish cryptography algorithm use a hardcoded key. An attacker with access to network traffic and to this key could decrypt network traffic between the Control-M/Agent and Server.

CVSS3: 7.4
EPSS: Низкий
github логотип

GHSA-grqv-c4p4-jp68

5 месяцев назад

Out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 (and potentially earlier unsupported versions) that are configured to use the non-default Blowfish cryptography algorithm use a hardcoded key. An attacker with access to network traffic and to this key could decrypt network traffic between the Control-M/Agent and Server.

CVSS3: 7.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-55112

Out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 (and potentially earlier unsupported versions) that are configured to use the non-default Blowfish cryptography algorithm use a hardcoded key. An attacker with access to network traffic and to this key could decrypt network traffic between the Control-M/Agent and Server.

CVSS3: 7.4
0%
Низкий
5 месяцев назад
github логотип
GHSA-grqv-c4p4-jp68

Out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 (and potentially earlier unsupported versions) that are configured to use the non-default Blowfish cryptography algorithm use a hardcoded key. An attacker with access to network traffic and to this key could decrypt network traffic between the Control-M/Agent and Server.

CVSS3: 7.4
0%
Низкий
5 месяцев назад

Уязвимостей на страницу