Important Security Update for Control-M/Agent


8 September 2025

BMC is providing an advance notice that a set of CVEs that affect Control-M/Agents will be published. These CVEs are specific to self-hosted environments and do not impact Control-M SaaS Agents.

This Technical Bulletin strongly recommends that you enable SSL/TLS for communication between Control-M/Agents and Control-M/Servers. SSL/TLS is the industry standard for secure communication and has been fully supported in Control-M for many years.

Even though Control-M components are often deployed within company firewalls and security perimeters, a non-TLS configuration leaves communication vulnerable to interception and tampering. Two common risk scenarios include the following:

  • External Breach: A third party penetrates the company’s network and gains access to communication between Control-M/Servers and Agents.
  • Insider Threat: Someone with legitimate access compromises confidentiality, integrity, or availability.

For comprehensive details on the upcoming disclosure, including the applicability of CVEs, potential impact, and recommended best practices for mitigation, see KA 000442099.

Advisory Timeline

DateAction
10 September 2025Advance Customer Notification (this Technical Bulletin)
16 September 2025Planned public CVE Disclosure (via MITRE/NVD) 
November 2025Planned public disclosure of a specific CVE related to enabling SSL/TLS

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*

Control-M