What are the steps needed to resolve the following CVEs?
| CVE Number | Severity | Description |
|---|
| CVE-2025-55108 | Critical (10.0) |
BMC Control-M/Agent default configuration does not enforce SSL/TLS allowing unauthorized actions and remote code execution
|
| CVE-2025-55109 | Critical (9.0) | Control-M/Agent default SSL/TLS configuration authenticated bypass |
| CVE-2025-55110 | Medium (5.5) | Control-M/Agent hardcoded default keystore password |
| CVE-2025-55111 | Medium (5.5) | Control-M/Agent insecure default SSL/TLS file permissions |
| CVE-2025-55112 | High (7.4) | Blowfish keys are hardcoded in the Control-M/Agent binary files |
| CVE-2025-55113 | Critical (9.0) | Control-M/Agent unescaped NULL byte in access control list checks |
| CVE-2025-55114 | Medium (5.3) | Control-M/Agent improper IP address filtering order |
| CVE-2025-55115 | High (8.8) | Control-M/Agent path traversal local privilege escalation |
| CVE-2025-55116 | High (8.8) | Control-M/Agent buffer overflow local privilege escalation |
| CVE-2025-55117 | Medium (5.3) | Control-M/Agent buffer overflow in SSL/TLS communication |
| CVE-2025-55118 | High (8.9) | Control-M/Agent memory corruption in SSL/TLS communication |