CVE-2025-71257: CWE-306 Missing Authentication for Critical Function in BMC Software, Inc. FootPrints
BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain an authentication bypass vulnerability due to improper enforcement of security filters on restricted REST API endpoints and servlets. Unauthenticated remote attackers can bypass access controls to invoke restricted functionality and gain unauthorized access to application data and modify system resources. The following hotfixes remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01.
AI Analysis
Technical Summary
CVE-2025-71257 is a critical function authentication bypass vulnerability identified in BMC Software's FootPrints IT Service Management (ITSM) product, specifically affecting versions 20.20.02 through 20.24.01.001. The root cause is improper enforcement of security filters on restricted REST API endpoints and servlets, which are intended to restrict access to sensitive functions and data. Due to this flaw, unauthenticated remote attackers can invoke these restricted functionalities without any credentials, effectively bypassing access controls. This unauthorized access can lead to exposure of sensitive application data and unauthorized modification of system resources, potentially undermining the integrity and confidentiality of the ITSM environment. The vulnerability does not require any user interaction, privileges, or authentication, making it relatively easy to exploit remotely over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N) reflects network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality, integrity, and availability. BMC has issued hotfixes for multiple versions to address this vulnerability, and organizations are strongly advised to apply these patches. No known exploits have been reported in the wild as of now, but the nature of the flaw makes it a significant risk if left unpatched.
Potential Impact
The vulnerability allows unauthenticated attackers to bypass authentication controls and access restricted REST API endpoints, which can lead to unauthorized disclosure of sensitive ITSM data and unauthorized modification of system resources. This can compromise the confidentiality and integrity of IT service management processes, potentially disrupting IT operations and exposing sensitive organizational information. Attackers could manipulate tickets, change configurations, or access confidential data stored within FootPrints, impacting incident management, change management, and other critical ITSM workflows. The ease of exploitation without authentication increases the risk of automated attacks and widespread exploitation in environments where vulnerable versions are deployed. Organizations relying heavily on BMC FootPrints for IT service management could face operational disruptions, compliance violations, and reputational damage if this vulnerability is exploited.
Mitigation Recommendations
Organizations should immediately identify all instances of BMC FootPrints ITSM running affected versions (20.20.02 through 20.24.01.001) and apply the official hotfixes released by BMC Software. These hotfixes specifically address the authentication bypass by properly enforcing security filters on REST API endpoints and servlets. Additionally, organizations should implement network-level access controls to restrict external access to FootPrints management interfaces, such as placing them behind VPNs or firewalls limiting access to trusted IPs. Monitoring and logging API access attempts can help detect suspicious activity indicative of exploitation attempts. Regularly auditing user permissions and API endpoint configurations can further reduce risk. In environments where immediate patching is not feasible, temporarily disabling or restricting access to vulnerable API endpoints can mitigate exposure. Finally, organizations should maintain an incident response plan to quickly address any suspected compromise related to this vulnerability.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, India, Netherlands, Singapore
CVE-2025-71257: CWE-306 Missing Authentication for Critical Function in BMC Software, Inc. FootPrints
Description
BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain an authentication bypass vulnerability due to improper enforcement of security filters on restricted REST API endpoints and servlets. Unauthenticated remote attackers can bypass access controls to invoke restricted functionality and gain unauthorized access to application data and modify system resources. The following hotfixes remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01.
AI-Powered Analysis
Technical Analysis
CVE-2025-71257 is a critical function authentication bypass vulnerability identified in BMC Software's FootPrints IT Service Management (ITSM) product, specifically affecting versions 20.20.02 through 20.24.01.001. The root cause is improper enforcement of security filters on restricted REST API endpoints and servlets, which are intended to restrict access to sensitive functions and data. Due to this flaw, unauthenticated remote attackers can invoke these restricted functionalities without any credentials, effectively bypassing access controls. This unauthorized access can lead to exposure of sensitive application data and unauthorized modification of system resources, potentially undermining the integrity and confidentiality of the ITSM environment. The vulnerability does not require any user interaction, privileges, or authentication, making it relatively easy to exploit remotely over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N) reflects network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality, integrity, and availability. BMC has issued hotfixes for multiple versions to address this vulnerability, and organizations are strongly advised to apply these patches. No known exploits have been reported in the wild as of now, but the nature of the flaw makes it a significant risk if left unpatched.
Potential Impact
The vulnerability allows unauthenticated attackers to bypass authentication controls and access restricted REST API endpoints, which can lead to unauthorized disclosure of sensitive ITSM data and unauthorized modification of system resources. This can compromise the confidentiality and integrity of IT service management processes, potentially disrupting IT operations and exposing sensitive organizational information. Attackers could manipulate tickets, change configurations, or access confidential data stored within FootPrints, impacting incident management, change management, and other critical ITSM workflows. The ease of exploitation without authentication increases the risk of automated attacks and widespread exploitation in environments where vulnerable versions are deployed. Organizations relying heavily on BMC FootPrints for IT service management could face operational disruptions, compliance violations, and reputational damage if this vulnerability is exploited.
Mitigation Recommendations
Organizations should immediately identify all instances of BMC FootPrints ITSM running affected versions (20.20.02 through 20.24.01.001) and apply the official hotfixes released by BMC Software. These hotfixes specifically address the authentication bypass by properly enforcing security filters on REST API endpoints and servlets. Additionally, organizations should implement network-level access controls to restrict external access to FootPrints management interfaces, such as placing them behind VPNs or firewalls limiting access to trusted IPs. Monitoring and logging API access attempts can help detect suspicious activity indicative of exploitation attempts. Regularly auditing user permissions and API endpoint configurations can further reduce risk. In environments where immediate patching is not feasible, temporarily disabling or restricting access to vulnerable API endpoints can mitigate exposure. Finally, organizations should maintain an incident response plan to quickly address any suspected compromise related to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-03-02T15:04:45.926Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69bc0011e32a4fbe5fc6a5c5
Added to database: 3/19/2026, 1:54:25 PM
Last enriched: 3/19/2026, 2:09:36 PM
Last updated: 3/20/2026, 5:17:16 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.