Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-71257: CWE-306 Missing Authentication for Critical Function in BMC Software, Inc. FootPrints

0
Medium
VulnerabilityCVE-2025-71257cvecve-2025-71257cwe-306
Published: Thu Mar 19 2026 (03/19/2026, 13:43:37 UTC)
Source: CVE Database V5
Vendor/Project: BMC Software, Inc.
Product: FootPrints

Description

BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain an authentication bypass vulnerability due to improper enforcement of security filters on restricted REST API endpoints and servlets. Unauthenticated remote attackers can bypass access controls to invoke restricted functionality and gain unauthorized access to application data and modify system resources. The following hotfixes remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01.

AI-Powered Analysis

AILast updated: 03/19/2026, 14:09:36 UTC

Technical Analysis

CVE-2025-71257 is a critical function authentication bypass vulnerability identified in BMC Software's FootPrints IT Service Management (ITSM) product, specifically affecting versions 20.20.02 through 20.24.01.001. The root cause is improper enforcement of security filters on restricted REST API endpoints and servlets, which are intended to restrict access to sensitive functions and data. Due to this flaw, unauthenticated remote attackers can invoke these restricted functionalities without any credentials, effectively bypassing access controls. This unauthorized access can lead to exposure of sensitive application data and unauthorized modification of system resources, potentially undermining the integrity and confidentiality of the ITSM environment. The vulnerability does not require any user interaction, privileges, or authentication, making it relatively easy to exploit remotely over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N) reflects network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality, integrity, and availability. BMC has issued hotfixes for multiple versions to address this vulnerability, and organizations are strongly advised to apply these patches. No known exploits have been reported in the wild as of now, but the nature of the flaw makes it a significant risk if left unpatched.

Potential Impact

The vulnerability allows unauthenticated attackers to bypass authentication controls and access restricted REST API endpoints, which can lead to unauthorized disclosure of sensitive ITSM data and unauthorized modification of system resources. This can compromise the confidentiality and integrity of IT service management processes, potentially disrupting IT operations and exposing sensitive organizational information. Attackers could manipulate tickets, change configurations, or access confidential data stored within FootPrints, impacting incident management, change management, and other critical ITSM workflows. The ease of exploitation without authentication increases the risk of automated attacks and widespread exploitation in environments where vulnerable versions are deployed. Organizations relying heavily on BMC FootPrints for IT service management could face operational disruptions, compliance violations, and reputational damage if this vulnerability is exploited.

Mitigation Recommendations

Organizations should immediately identify all instances of BMC FootPrints ITSM running affected versions (20.20.02 through 20.24.01.001) and apply the official hotfixes released by BMC Software. These hotfixes specifically address the authentication bypass by properly enforcing security filters on REST API endpoints and servlets. Additionally, organizations should implement network-level access controls to restrict external access to FootPrints management interfaces, such as placing them behind VPNs or firewalls limiting access to trusted IPs. Monitoring and logging API access attempts can help detect suspicious activity indicative of exploitation attempts. Regularly auditing user permissions and API endpoint configurations can further reduce risk. In environments where immediate patching is not feasible, temporarily disabling or restricting access to vulnerable API endpoints can mitigate exposure. Finally, organizations should maintain an incident response plan to quickly address any suspected compromise related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-03-02T15:04:45.926Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bc0011e32a4fbe5fc6a5c5

Added to database: 3/19/2026, 1:54:25 PM

Last enriched: 3/19/2026, 2:09:36 PM

Last updated: 3/20/2026, 5:17:16 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses