CVE-2026-23782 Overview
An issue was discovered in BMC Control-M/MFT 9.0.20 through 9.0.22. An API management endpoint allows unauthenticated users to obtain both an API identifier and its corresponding secret value. With these exposed secrets, an attacker could invoke privileged API operations, potentially leading to unauthorized access.
Critical Impact
Unauthenticated attackers can obtain API credentials and invoke privileged operations, potentially compromising enterprise file transfer workflows and sensitive data managed by Control-M/MFT.
Affected Products
- BMC Control-M/MFT 9.0.20
- BMC Control-M/MFT 9.0.21
- BMC Control-M/MFT 9.0.22
Discovery Timeline
- 2026-04-10 - CVE CVE-2026-23782 published to NVD
- 2026-04-14 - Last updated in NVD database
Technical Details for CVE-2026-23782
Vulnerability Analysis
This vulnerability represents a critical Improper Access Control flaw (CWE-284) in BMC Control-M/MFT, an enterprise managed file transfer solution widely used for automated file transfer workflows. The vulnerability exists in an API management endpoint that fails to enforce proper authentication before disclosing sensitive credentials.
The affected endpoint exposes both the API identifier and its corresponding secret value to unauthenticated users. These credentials are typically used to authenticate API calls and authorize privileged operations within the Control-M/MFT environment. By obtaining these secrets, an attacker gains the ability to make authenticated API requests with elevated privileges.
The impact is significant for organizations using Control-M/MFT in production environments, as attackers could potentially manipulate file transfer jobs, access sensitive data in transit, or disrupt critical business workflows that depend on the managed file transfer infrastructure.
Root Cause
The root cause is improper access control (CWE-284) in the API management endpoint. The endpoint fails to verify that requests are from authenticated and authorized users before returning sensitive API credentials. This represents a fundamental authentication bypass where credential disclosure occurs without any identity verification, allowing unauthenticated network-accessible attackers to harvest privileged API secrets.
Attack Vector
The attack vector is network-based and requires no authentication or user interaction. An attacker with network access to the Control-M/MFT management interface can directly query the vulnerable API endpoint to retrieve credential information.
The attack flow involves:
- Attacker identifies a network-accessible BMC Control-M/MFT instance running versions 9.0.20 through 9.0.22
- Attacker sends unauthenticated requests to the vulnerable API management endpoint
- The endpoint returns API identifier and secret values without authentication checks
- Attacker uses the harvested credentials to invoke privileged API operations
- Attacker gains unauthorized access to file transfer operations, job configurations, or sensitive data
Detection Methods for CVE-2026-23782
Indicators of Compromise
- Unusual or unexpected API calls to the Control-M/MFT management interface from unknown IP addresses
- Authentication events using API credentials from sources that do not match expected application servers
- Anomalous access patterns to the API management endpoint, particularly high-frequency enumeration requests
- Unauthorized modifications to file transfer jobs or configurations
Detection Strategies
- Monitor network traffic for unauthenticated requests to the API management endpoint
- Implement alerting for API credential usage from IP addresses outside approved ranges
- Deploy web application firewall (WAF) rules to detect and block suspicious API enumeration attempts
- Enable comprehensive audit logging for all API authentication events and credential access
Monitoring Recommendations
- Configure SIEM rules to correlate API credential usage with source IP reputation
- Establish baseline API access patterns and alert on deviations
- Monitor for bulk or sequential API endpoint queries that may indicate reconnaissance activity
- Review Control-M/MFT audit logs regularly for unauthorized configuration changes
How to Mitigate CVE-2026-23782
Immediate Actions Required
- Apply the latest security patches from BMC for Control-M/MFT immediately
- Restrict network access to the Control-M/MFT management interface using firewall rules
- Rotate all API credentials that may have been exposed prior to patching
- Review audit logs for any evidence of unauthorized API access or credential harvesting
Patch Information
BMC has released patches to address this vulnerability. Organizations should consult the BMC Control-M Patch Note for specific patch details and installation instructions. Additional support resources are available through the BMC Issue Defect Management Resource.
Workarounds
- Implement network segmentation to limit access to the Control-M/MFT management interface to authorized administrative networks only
- Deploy a reverse proxy with authentication requirements in front of the API management endpoint
- Use IP allowlisting to restrict which hosts can communicate with the management API
- Consider temporarily disabling external API access if not operationally required until patches can be applied
# Example: Restrict network access to Control-M/MFT management port using iptables
# Adjust interface, port, and allowed IP range according to your environment
iptables -A INPUT -p tcp --dport 8443 -s 10.0.0.0/24 -j ACCEPT
iptables -A INPUT -p tcp --dport 8443 -j DROP
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

