CVE-2025-71257
BMC FootPrints ITSM 20.20.02 <= 20.24.01.001 Authentication Bypass
CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th
BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain an authentication bypass vulnerability due to improper enforcement of security filters on restricted REST API endpoints and servlets. Unauthenticated remote attackers can bypass access controls to invoke restricted functionality and gain unauthorized access to application data and modify system resources.Β The following hotfixes remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01.
| CWE | CWE-306 |
| Vendor | bmc software, inc. |
| Product | footprints |
| Published | Mar 19, 2026 |
| Last Updated | Mar 19, 2026 |
Stay Ahead of the Next One
Get instant alerts for bmc software, inc. footprints
Be the first to know when new high vulnerabilities affecting bmc software, inc. footprints are published β delivered to Slack, Telegram or Discord.
Get Free Alerts β
Free Β· No credit card Β· 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
Affected Versions
BMC Software, Inc. / FootPrints
20.20.02 β€ 20.24.01.001
References
docs.bmc.com: https://docs.bmc.com/xwiki/bin/view/More-Products/Footprints/FootPrints/fp2024/Release-notes/2024-Release-01-Patch-2/ labs.watchtowr.com: https://labs.watchtowr.com/thanks-itsms-threat-actors-have-never-been-so-organized-bmc-footprints-pre-auth-remote-code-execution-chains/ vulncheck.com: https://www.vulncheck.com/advisories/bmc-footprints-itsm-authentication-bypass
Credits
Sonny of watchTowr