CVE-2025-71257
Published: 19 March 2026
Description
BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain an authentication bypass vulnerability due to improper enforcement of security filters on restricted REST API endpoints and servlets. Unauthenticated remote attackers can bypass access controls to invoke restricted functionality and gain unauthorized…
more
access to application data and modify system resources. The following hotfixes remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01.
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations on restricted REST API endpoints and servlets to prevent authentication bypass due to improper security filters.
Implements a non-bypassable reference monitor to mediate access to system resources, directly countering the filter enforcement failure in BMC FootPrints ITSM.
Requires timely application of vendor hotfixes to remediate the specific authentication bypass vulnerability in affected BMC FootPrints versions.
Security SummaryAI
CVE-2025-71257 is an authentication bypass vulnerability (CWE-306) in BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001. The issue arises from improper enforcement of security filters on restricted REST API endpoints and servlets, allowing attackers to circumvent authentication mechanisms.
Unauthenticated remote attackers can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation enables bypassing access controls to invoke restricted functionality, resulting in unauthorized access to application data and the ability to modify system resources. The CVSS v3.1 base score is 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).
BMC has released hotfixes to remediate the vulnerability, including versions 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01. Additional mitigation guidance and details are provided in advisories from BMC release notes, Watchtower Labs, and VulnCheck.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Authentication bypass on restricted REST API endpoints and servlets in a public-facing web application directly enables T1190: Exploit Public-Facing Application.