bmc CVE Vulnerabilities & Metrics

Focus on bmc vulnerabilities and metrics.

Last updated: 16 Apr 2025, 22:25 UTC

About bmc Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with bmc. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total bmc CVEs: 40
Earliest CVE date: 02 Nov 1998, 05:00 UTC
Latest CVE date: 07 May 2024, 23:15 UTC

Latest CVE reference: CVE-2021-35002

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 2

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -60.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -60.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical bmc CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.07

Max CVSS: 10.0

Critical CVEs (≥9): 5

CVSS Range vs. Count

Range Count
0.0-3.9 14
4.0-6.9 24
7.0-8.9 16
9.0-10.0 5

CVSS Distribution Chart

Top 5 Highest CVSS bmc CVEs

These are the five CVEs with the highest CVSS scores for bmc, sorted by severity first and recency.

All CVEs for bmc

CVE-2021-35002 bmc vulnerability CVSS: 0 07 May 2024, 23:15 UTC

BMC Track-It! Unrestricted File Upload Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of BMC Track-It!. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of email attachments. The issue results from the lack of proper validation of user-supplied data, which can allow the upload of arbitrary files. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-14122.

CVE-2021-35001 bmc vulnerability CVSS: 0 07 May 2024, 23:15 UTC

BMC Track-It! GetData Missing Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of BMC Track-It!. Authentication is required to exploit this vulnerability. The specific flaw exists within the GetData endpoint. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-14527.

CVE-2020-35593 bmc vulnerability CVSS: 0 05 Sep 2023, 19:15 UTC

BMC PATROL Agent through 20.08.00 allows local privilege escalation via vectors involving pconfig +RESTART -host.

CVE-2017-9453 bmc vulnerability CVSS: 0 05 Sep 2023, 18:15 UTC

BMC Server Automation before 8.9.01 patch 1 allows Process Spawner command execution because of authentication bypass.

CVE-2023-39122 bmc vulnerability CVSS: 0 31 Jul 2023, 23:15 UTC

BMC Control-M through 9.0.20.200 allows SQL injection via the /RF-Server/report/deleteReport report-id parameter. This is fixed in 9.0.21 (and is also fixed by a patch for 9.0.20.200).

CVE-2023-34258 bmc vulnerability CVSS: 0 31 May 2023, 20:15 UTC

An issue was discovered in BMC Patrol before 22.1.00. The agent's configuration can be remotely queried. This configuration contains the Patrol account password, encrypted with a default AES key. This account can then be used to achieve remote code execution.

CVE-2023-34257 bmc vulnerability CVSS: 0 31 May 2023, 20:15 UTC

An issue was discovered in BMC Patrol through 23.1.00. The agent's configuration can be remotely modified (and, by default, authentication is not required). Some configuration fields related to SNMP (e.g., masterAgentName or masterAgentStartLine) result in code execution when the agent is restarted. NOTE: the vendor's perspective is "These are not vulnerabilities for us as we have provided the option to implement the authentication."

CVE-2023-26550 bmc vulnerability CVSS: 0 25 Feb 2023, 20:15 UTC

A SQL injection vulnerability in BMC Control-M before 9.0.20.214 allows attackers to execute arbitrary SQL commands via the memname JSON field.

CVE-2022-26088 bmc vulnerability CVSS: 0 10 Nov 2022, 21:15 UTC

An issue was discovered in BMC Remedy before 22.1. Email-based Incident Forwarding allows remote authenticated users to inject HTML (such as an SSRF payload) into the Activity Log by placing it in the To: field. This affects rendering that occurs upon a click in the "number of recipients" field. NOTE: the vendor's position is that "no real impact is demonstrated."

CVE-2022-35865 bmc vulnerability CVSS: 0 03 Aug 2022, 16:15 UTC

This vulnerability allows remote attackers to execute arbitrary code on affected installations of BMC Track-It! 20.21.2.109. Authentication is not required to exploit this vulnerability. The specific flaw exists within the authorization of HTTP requests. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-16709.

CVE-2022-35864 bmc vulnerability CVSS: 0 03 Aug 2022, 16:15 UTC

This vulnerability allows remote attackers to disclose sensitive information on affected installations of BMC Track-It! 20.21.02.109. Authentication is required to exploit this vulnerability. The specific flaw exists within the GetPopupSubQueryDetails endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-16690.

CVE-2022-24047 bmc vulnerability CVSS: 7.5 18 Feb 2022, 20:15 UTC

This vulnerability allows remote attackers to bypass authentication on affected installations of BMC Track-It! 20.21.01.102. Authentication is not required to exploit this vulnerability. The specific flaw exists within the authorization of HTTP requests. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-14618.

CVE-2017-17678 bmc vulnerability CVSS: 4.3 19 May 2021, 14:15 UTC

BMC Remedy Mid Tier 9.1SP3 is affected by cross-site scripting (XSS). A DOM-based cross-site scripting vulnerability was discovered in a legacy utility.

CVE-2017-17677 bmc vulnerability CVSS: 6.5 19 May 2021, 14:15 UTC

BMC Remedy 9.1SP3 is affected by authenticated code execution. Authenticated users that have the right to create reports can use BIRT templates to run code.

CVE-2017-17675 bmc vulnerability CVSS: 5.0 19 May 2021, 14:15 UTC

BMC Remedy Mid Tier 9.1SP3 is affected by log hijacking. Remote logging can be accessed by unauthenticated users, allowing for an attacker to hijack the system logs. This data can include user names and HTTP data.

CVE-2017-17674 bmc vulnerability CVSS: 7.5 19 May 2021, 14:15 UTC

BMC Remedy Mid Tier 9.1SP3 is affected by remote and local file inclusion. Due to the lack of restrictions on what can be targeted, the system can be vulnerable to attacks such as system fingerprinting, internal port scanning, Server Side Request Forgery (SSRF), or remote code execution (RCE).

CVE-2015-5072 bmc vulnerability CVSS: 4.0 15 Jan 2020, 18:15 UTC

The BIRT Engine servlet in the AR System Mid Tier component before 9.0 SP1 for BMC Remedy AR System Server allows remote authenticated users to "navigate" to arbitrary local files via the __imageid parameter.

CVE-2015-5071 bmc vulnerability CVSS: 4.0 15 Jan 2020, 18:15 UTC

AR System Mid Tier in the AR System Mid Tier component before 9.0 SP1 for BMC Remedy AR System Server allows remote authenticated users to "navigate" to arbitrary files via the __report parameter of the BIRT viewer servlet.

CVE-2019-11216 bmc vulnerability CVSS: 5.5 04 Dec 2019, 20:15 UTC

BMC Smart Reporting 7.3 20180418 allows authenticated XXE within the import functionality. One can import a malicious XML file and perform XXE attacks to download local files from the server, or do DoS attacks with XML expansion attacks. XXE with direct response and XXE OOB are allowed.

CVE-2019-17044 bmc vulnerability CVSS: 7.2 14 Oct 2019, 17:15 UTC

An issue was discovered in BMC Patrol Agent 9.0.10i. Weak execution permissions on the PatrolAgent SUID binary could allow an attacker with "patrol" privileges to elevate his/her privileges to the ones of the "root" user by specially crafting a shared library .so file that will be loaded during execution.

CVE-2019-17043 bmc vulnerability CVSS: 4.6 14 Oct 2019, 17:15 UTC

An issue was discovered in BMC Patrol Agent 9.0.10i. Weak execution permissions on the best1collect.exe SUID binary could allow an attacker to elevate his/her privileges to the ones of the "patrol" user by specially crafting a shared library .so file that will be loaded during execution.

CVE-2019-16755 bmc vulnerability CVSS: 7.5 26 Sep 2019, 16:15 UTC

BMC Remedy ITSM Suite is prone to unspecified vulnerabilities in both DWP and SmartIT components, which can permit remote attackers to perform pre-authenticated remote commands execution on the Operating System running the targeted application. Affected DWP versions: versions: 3.x to 18.x, all versions, service packs, and patches are affected by this vulnerability. Affected SmartIT versions: 1.x, 2.0, 18.05, 18.08, and 19.02, all versions, service packs, and patches are affected by this vulnerability.

CVE-2019-1010147 bmc vulnerability CVSS: 3.5 26 Jul 2019, 00:15 UTC

Yellowfin Smart Reporting All Versions Prior to 7.3 is affected by: Incorrect Access Control - Privileges Escalation. The impact is: Victim attacked and access admin functionality through their browser and control browser. The component is: MIAdminStyles.i4. The attack vector is: Victims are typically lured to a web site under the attacker's control; the XSS vulnerability on the target domain is silently exploited without the victim's knowledge. The fixed version is: 7.4 and later.

CVE-2019-8352 bmc vulnerability CVSS: 7.5 20 May 2019, 19:29 UTC

By default, BMC PATROL Agent through 11.3.01 uses a static encryption key for encrypting/decrypting user credentials sent over the network to managed PATROL Agent services. If an attacker were able to capture this network traffic, they could decrypt these credentials and use them to execute code or escalate privileges on the network.

CVE-2018-18862 bmc vulnerability CVSS: 6.5 21 Mar 2019, 16:00 UTC

BMC Remedy Mid-Tier 7.1.00 and 9.1.02.003 for BMC Remedy AR System has Incorrect Access Control in ITAM forms, as demonstrated by TLS%3APLR-Configuration+Details/Default+Admin+View/, AST%3AARServerConnection/Default+Admin+View/, and AR+System+Administration%3A+Server+Information/Default+Admin+View/.

CVE-2018-20735 bmc vulnerability CVSS: 7.2 17 Jan 2019, 20:29 UTC

An issue was discovered in BMC PATROL Agent through 11.3.01. It was found that the PatrolCli application can allow for lateral movement and escalation of privilege inside a Windows Active Directory environment. It was found that by default the PatrolCli / PATROL Agent application only verifies if the password provided for the given username is correct; it does not verify the permissions of the user on the network. This means if you have PATROL Agent installed on a high value target (domain controller), you can use a low privileged domain user to authenticate with PatrolCli and then connect to the domain controller and run commands as SYSTEM. This means any user on a domain can escalate to domain admin through PATROL Agent. NOTE: the vendor disputes this because they believe it is adequate to prevent this escalation by means of a custom, non-default configuration

CVE-2018-19505 bmc vulnerability CVSS: 4.0 03 Jan 2019, 19:29 UTC

Remedy AR System Server in BMC Remedy 7.1 may fail to set the correct user context in certain impersonation scenarios, which can allow a user to act with the identity of a different user, because userdata.js in the WOI:WorkOrderConsole component allows a username substitution involving a UserData_Init call.

CVE-2015-9257 bmc vulnerability CVSS: 4.3 24 Mar 2018, 20:29 UTC

BMC Remedy Action Request (AR) System 9.0 before 9.0.00 Service Pack 2 hot fix 1 has persistent XSS.

CVE-2017-18228 bmc vulnerability CVSS: 3.5 12 Mar 2018, 23:29 UTC

Remedy Mid Tier in BMC Remedy AR System 9.1 allows XSS via the ATTKey parameter in an arsys/servlet/AttachServlet request.

CVE-2017-18223 bmc vulnerability CVSS: 6.8 10 Mar 2018, 22:29 UTC

BMC Remedy AR System before 9.1 SP3, when Remedy AR Authentication is enabled, allows attackers to obtain administrative access.

CVE-2016-6599 bmc vulnerability CVSS: 7.5 30 Jan 2018, 20:29 UTC

BMC Track-It! 11.4 before Hotfix 3 exposes an unauthenticated .NET remoting configuration service (ConfigurationService) on port 9010. This service contains a method that can be used to retrieve a configuration file that contains the application database name, username and password as well as the domain administrator username and password. These are encrypted with a fixed key and IV ("NumaraIT") using the DES algorithm. The domain administrator username and password can only be obtained if the Self-Service component is enabled, which is the most common scenario in enterprise deployments.

CVE-2016-6598 bmc vulnerability CVSS: 10.0 30 Jan 2018, 20:29 UTC

BMC Track-It! 11.4 before Hotfix 3 exposes an unauthenticated .NET remoting file storage service (FileStorageService) on port 9010. This service contains a method that allows uploading a file to an arbitrary path on the machine that is running Track-It!. This can be used to upload a file to the web root and achieve code execution as NETWORK SERVICE or SYSTEM.

CVE-2014-9514 bmc vulnerability CVSS: 4.3 28 Aug 2017, 15:29 UTC

Cross-site scripting (XSS) vulnerability in BMC Footprints Service Core 11.5.

CVE-2017-13130 bmc vulnerability CVSS: 7.2 23 Aug 2017, 00:29 UTC

mcmnm in BMC Patrol allows local users to gain privileges via a crafted libmcmclnx.so file in the current working directory, because it is setuid root and the RPATH variable begins with the .: substring.

CVE-2016-5063 bmc vulnerability CVSS: 5.0 02 May 2017, 14:59 UTC

The RSCD agent in BMC Server Automation before 8.6 SP1 Patch 2 and 8.7 before Patch 3 on Windows might allow remote attackers to bypass authorization checks and make an RPC call via unspecified vectors.

CVE-2016-2349 bmc vulnerability CVSS: 5.0 21 Dec 2016, 22:59 UTC

Remedy AR System Server in BMC Remedy 8.1 SP 2, 9.0, 9.0 SP 1, and 9.1 allows attackers to reset arbitrary passwords via a blank previous password.

CVE-2016-4322 bmc vulnerability CVSS: 7.5 13 Dec 2016, 20:59 UTC

BMC BladeLogic Server Automation (BSA) before 8.7 Patch 3 allows remote attackers to bypass authentication and consequently read arbitrary files or possibly have unspecified other impact by leveraging a "logic flaw" in the authentication process.

CVE-2016-9638 bmc vulnerability CVSS: 7.2 02 Dec 2016, 17:59 UTC

In BMC Patrol before 9.13.10.02, the binary "listguests64" is configured with the setuid bit. However, when executing it, it will look for a binary named "virsh" using the PATH environment variable. The "listguests64" program will then run "virsh" using root privileges. This allows local users to elevate their privileges to root.

CVE-2016-1543 bmc vulnerability CVSS: 5.0 13 Jun 2016, 14:59 UTC

The RPC API in the RSCD agent in BMC BladeLogic Server Automation (BSA) 8.2.x, 8.3.x, 8.5.x, 8.6.x, and 8.7.x on Linux and UNIX allows remote attackers to bypass authorization and reset arbitrary user passwords by sending an action packet to xmlrpc after an authorization failure.

CVE-2016-1542 bmc vulnerability CVSS: 5.0 13 Jun 2016, 14:59 UTC

The RPC API in RSCD agent in BMC BladeLogic Server Automation (BSA) 8.2.x, 8.3.x, 8.5.x, 8.6.x, and 8.7.x on Linux and UNIX allows remote attackers to bypass authorization and enumerate users by sending an action packet to xmlrpc after an authorization failure.

CVE-2014-8270 bmc vulnerability CVSS: 5.0 12 Dec 2014, 11:59 UTC

BMC Track-It! 11.3 allows remote attackers to gain privileges and execute arbitrary code by creating an account whose name matches that of a local system account, then performing a password reset.

CVE-2014-4874 bmc vulnerability CVSS: 4.0 10 Oct 2014, 10:55 UTC

BMC Track-It! 11.3.0.355 allows remote authenticated users to read arbitrary files by visiting the TrackItWeb/Attachment page.

CVE-2014-4873 bmc vulnerability CVSS: 6.5 10 Oct 2014, 10:55 UTC

SQL injection vulnerability in TrackItWeb/Grid/GetData in BMC Track-It! 11.3.0.355 allows remote authenticated users to execute arbitrary SQL commands via crafted POST data.

CVE-2014-4872 bmc vulnerability CVSS: 7.5 10 Oct 2014, 10:55 UTC

BMC Track-It! 11.3.0.355 does not require authentication on TCP port 9010, which allows remote attackers to upload arbitrary files, execute arbitrary code, or obtain sensitive credential and configuration information via a .NET Remoting request to (1) FileStorageService or (2) ConfigurationService.

CVE-2014-2591 bmc vulnerability CVSS: 6.9 14 May 2014, 00:55 UTC

Untrusted search path vulnerability in BMC Patrol for AIX 3.9.00 allows local users to gain privileges via a crafted library, related to an incorrect RPATH setting.

CVE-2013-4946 bmc vulnerability CVSS: 4.3 29 Jul 2013, 23:27 UTC

Multiple cross-site scripting (XSS) vulnerabilities in BMC Service Desk Express (SDE) 10.2.1.95 allow remote attackers to inject arbitrary web script or HTML via the (1) SelTab parameter to QV_admin.aspx, the (2) CallBack parameter to QV_grid.aspx, or the (3) HelpPage parameter to commonhelp.aspx.

CVE-2013-4945 bmc vulnerability CVSS: 7.5 29 Jul 2013, 23:27 UTC

Multiple SQL injection vulnerabilities in BMC Service Desk Express (SDE) 10.2.1.95 allow remote attackers to execute arbitrary SQL commands via the (1) ASPSESSIONIDASSRATTQ, (2) TABLE_WIDGET_1, (3) TABLE_WIDGET_2, (4) browserDateTimeInfo, or (5) browserNumberInfo cookie parameter to DashBoardGUI.aspx; or the (6) UID parameter to login.aspx.

CVE-2012-2959 bmc vulnerability CVSS: 5.1 11 Jun 2012, 23:55 UTC

Cross-site request forgery (CSRF) vulnerability in password-manager/changePasswords.do in BMC Identity Management Suite 7.5.00.103 allows remote attackers to hijack the authentication of administrators for requests that change passwords.

CVE-2011-0975 bmc vulnerability CVSS: 10.0 10 Feb 2011, 18:00 UTC

Stack-based buffer overflow in BMC PATROL Agent Service Daemon for in Performance Analysis for Servers, Performance Assurance for Servers, and Performance Assurance for Virtual Servers 7.4.00 through 7.5.10; Performance Analyzer and Performance Predictor for Servers 7.4.00 through 7.5.10; and Capacity Management Essentials 1.2.00 (7.4.15) allows remote attackers to execute arbitrary code via a crafted length value in a BGS_MULTIPLE_READS command to TCP port 6768.

CVE-2008-5982 bmc vulnerability CVSS: 10.0 27 Jan 2009, 22:30 UTC

Format string vulnerability in BMC PATROL Agent before 3.7.30 allows remote attackers to execute arbitrary code via format string specifiers in an invalid version number to TCP port 3181, which are not properly handled when writing a log message.

CVE-2007-1972 bmc vulnerability CVSS: 7.5 22 Apr 2007, 19:19 UTC

PatrolAgent.exe in BMC Performance Manager does not require authentication for requests to modify configuration files, which allows remote attackers to execute arbitrary code via a request on TCP port 3181 for modification of the masterAgentName and masterAgentStartLine SNMP parameters. NOTE: the vendor disputes this vulnerability, stating that it does not exist when the system is properly configured

CVE-2007-2136 bmc vulnerability CVSS: 7.5 22 Apr 2007, 19:19 UTC

Stack-based buffer overflow in bgs_sdservice.exe in BMC Patrol PerformAgent allows remote attackers to execute arbitrary code by connecting to TCP port 10128 and sending certain XDR data, which is not properly parsed.

CVE-2007-0310 bmc vulnerability CVSS: 5.0 18 Jan 2007, 00:28 UTC

BMC Remedy Action Request System 5.01.02 Patch 1267 generates different error messages for failed login attempts with a valid username than for those with an invalid username, which allows remote attackers to determine valid account names.

CVE-2005-3311 bmc vulnerability CVSS: 2.1 26 Oct 2005, 01:02 UTC

BMC Software Control-M 6.1.03 for Solaris, and possibly other platforms, allows local users to overwrite arbitrary files via a symlink attack on temporary files.

CVE-1999-1460 bmc vulnerability CVSS: 7.2 13 Jul 1999, 04:00 UTC

BMC PATROL SNMP Agent before 3.2.07 allows local users to create arbitrary world-writeable files as root by specifying the target file as the second argument to the snmpmagt program.

CVE-1999-0801 bmc vulnerability CVSS: 10.0 09 Apr 1999, 04:00 UTC

BMC Patrol allows remote attackers to gain access to an agent by spoofing frames.

CVE-1999-0443 bmc vulnerability CVSS: 10.0 01 Apr 1999, 05:00 UTC

Patrol management software allows a remote attacker to conduct a replay attack to steal the administrator password.

CVE-1999-0921 bmc vulnerability CVSS: 5.0 01 Apr 1999, 05:00 UTC

BMC Patrol allows any remote attacker to flood its UDP port, causing a denial of service.

CVE-1999-1459 bmc vulnerability CVSS: 7.2 02 Nov 1998, 05:00 UTC

BMC PATROL Agent before 3.2.07 allows local users to gain root privileges via a symlink attack on a temporary file.