CVE-2025-71257 Scanner
CVE-2025-71257 Scanner - Authentication Bypass vulnerability in BMC FootPrints
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
1 minute
Time Interval
27 days 1 hour
Scan only one
Domain, Subdomain, IPv4
Toolbox
BMC FootPrints is a service management software commonly used in IT departments to manage and automate service requests, incidents, and changes within an organization. Developed by BMC Software, it assists businesses in streamlining their service management processes and enhancing productivity. The software is typically deployed by enterprises that need to handle complex IT service management tasks efficiently. Its multi-functional range includes service desk operations, incident management, and IT asset management. This software supports organizations in improving communication between service desks and end-users, ensuring quicker response times. It aims to enhance customer satisfaction and operational efficiency in IT service delivery.
The vulnerability in question is an Authentication Bypass, specifically affecting the password reset functionality of BMC FootPrints. This flaw allows unauthenticated attackers to exploit the password reset endpoint to obtain a valid SEC_TOKEN session cookie. As a result, attackers can bypass the usual authentication mechanisms without rightful access permissions. This vulnerability opens the door for potential exploitation of other security flaws, creating a chain of vulnerabilities that could severely compromise the affected system's security. Exploiting this vulnerability could enable attackers to access restricted areas of the application, posing a significant risk to sensitive data integrity and confidentiality.
The technical aspect of this vulnerability centers around the password reset functionality at the /footprints/servicedesk/passwordreset/request/ endpoint. An attacker can exploit this endpoint to request a SEC_TOKEN session cookie, circumventing standard authentication protocols. All BMC FootPrints versions from 20.20.02 to 20.24.01.001 are susceptible to this flaw. The vulnerability potentially facilitates further exploitation of the system's security, as it could be part of a larger attack chain. This attack vector particularly affects the service desk module, crucial for IT service management, and could be used to obtain unauthorized access to system resources.
When exploited, this authentication bypass vulnerability allows attackers to gain unauthorized access to sensitive application features and information. The attackers can manipulate or alter application data, leading to significant data breaches. The compromised system's resources could further facilitate the launch of additional attacks such as remote code execution or server-side request forgery. Due to the nature of this vulnerability, the potential effects include the disruption of service operations and loss of sensitive business data, compromising the organization's overall security posture.
REFERENCES