Impact
The vulnerability in BMC FootPrints ITSM arises when the application deserializes untrusted data supplied in the ASP.NET VIEWSTATE parameter. An authenticated user can craft a malicious serialized payload that the servlet processes, leading to execution of arbitrary code within the FootPrints process. This flaw is classified as CWE‑502 and allows a full compromise of the FootPrints instance.
Affected Systems
BMC Software, Inc. FootPrints ITSM versions 20.20.02 through 20.24.01.001 are affected. The vendor has released hotfixes covering each of these releases; systems that have not applied the corresponding patch remain vulnerable.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity, and the EPSS score of 37% suggests a moderate probability of exploitation. The flaw requires authenticated access to the FootPrints web interface; once authenticated, attackers can inject a malicious VIEWSTATE value that triggers arbitrary code execution. The vulnerability is not listed in the CISA KEV catalog. Given the high impact and the effective pathway for code execution, the risk to affected installations is significant.
OpenCVE Enrichment