Cyber Posture

CVE-2025-71257

HighPublic PoCUpdated

Published: 19 March 2026

Published
19 March 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.1209 93.9th percentile
Risk Priority 22 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-71257 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Bmc Footprints Itsm. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 6.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-25 (Reference Monitor) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations on restricted REST API endpoints and servlets to prevent authentication bypass due to improper security filters.

prevent

Implements a non-bypassable reference monitor to mediate access to system resources, directly countering the filter enforcement failure in BMC FootPrints ITSM.

prevent

Requires timely application of vendor hotfixes to remediate the specific authentication bypass vulnerability in affected BMC FootPrints versions.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Authentication bypass on restricted REST API endpoints and servlets in a public-facing web application directly enables T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain an authentication bypass vulnerability due to improper enforcement of security filters on restricted REST API endpoints and servlets. Unauthenticated remote attackers can bypass access controls to invoke restricted functionality and gain unauthorized…

more

access to application data and modify system resources. The following hotfixes remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01.

Deeper analysisAI

CVE-2025-71257 is an authentication bypass vulnerability (CWE-306) in BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001. The issue arises from improper enforcement of security filters on restricted REST API endpoints and servlets, allowing attackers to circumvent authentication mechanisms.

Unauthenticated remote attackers can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation enables bypassing access controls to invoke restricted functionality, resulting in unauthorized access to application data and the ability to modify system resources. The CVSS v3.1 base score is 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).

BMC has released hotfixes to remediate the vulnerability, including versions 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01. Additional mitigation guidance and details are provided in advisories from BMC release notes, Watchtower Labs, and VulnCheck.

Details

CWE(s)

Affected Products

bmc
footprints itsm
20.20.02 — 20.24.01.001

CVEs Like This One

CVE-2025-71260Same product: Bmc Footprints Itsm
CVE-2025-71259Same product: Bmc Footprints Itsm
CVE-2025-71258Same product: Bmc Footprints Itsm
CVE-2026-26340Shared CWE-306
CVE-2025-54816Shared CWE-306
CVE-2025-53072Shared CWE-306
CVE-2026-4640Shared CWE-306
CVE-2026-40884Shared CWE-306
CVE-2026-34279Shared CWE-306
CVE-2026-44413Shared CWE-306

References