πŸ” CVE Alert

CVE-2025-71257

HIGH 7.3

BMC FootPrints ITSM 20.20.02 <= 20.24.01.001 Authentication Bypass

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th

BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain an authentication bypass vulnerability due to improper enforcement of security filters on restricted REST API endpoints and servlets. Unauthenticated remote attackers can bypass access controls to invoke restricted functionality and gain unauthorized access to application data and modify system resources.Β The following hotfixes remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01.

CWE CWE-306
Vendor bmc software, inc.
Product footprints
Published Mar 19, 2026
Last Updated Mar 19, 2026
Stay Ahead of the Next One

Get instant alerts for bmc software, inc. footprints

Be the first to know when new high vulnerabilities affecting bmc software, inc. footprints are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Affected Versions

BMC Software, Inc. / FootPrints
20.20.02 ≀ 20.24.01.001

References

NVD β†— CVE.org β†— EPSS Data β†—
docs.bmc.com: https://docs.bmc.com/xwiki/bin/view/More-Products/Footprints/FootPrints/fp2024/Release-notes/2024-Release-01-Patch-2/ labs.watchtowr.com: https://labs.watchtowr.com/thanks-itsms-threat-actors-have-never-been-so-organized-bmc-footprints-pre-auth-remote-code-execution-chains/ vulncheck.com: https://www.vulncheck.com/advisories/bmc-footprints-itsm-authentication-bypass

Credits

Sonny of watchTowr