CVE-2024-8923

9.8 CRITICAL

📋 TL;DR

This is a critical input validation vulnerability in ServiceNow's Now Platform that allows unauthenticated remote code execution. All ServiceNow instances running vulnerable versions are affected, including both hosted and self-hosted deployments. The vulnerability enables attackers to execute arbitrary code on the target system.

💻 Affected Systems

Products:
  • ServiceNow Now Platform
Versions: Specific versions not detailed in advisory; affected versions are those prior to the patches and hot fixes mentioned in KB1706070
Operating Systems: Not OS-specific - affects ServiceNow platform regardless of underlying OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both ServiceNow-hosted instances and self-hosted customer deployments. The vulnerability exists in the platform itself, not dependent on specific configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code, steal sensitive data, deploy ransomware, or establish persistent access to the entire ServiceNow environment and potentially connected systems.

🟠

Likely Case

Attackers exploit the vulnerability to gain initial access, deploy web shells, exfiltrate sensitive business data, and move laterally within the network.

🟢

If Mitigated

With proper network segmentation, intrusion detection, and timely patching, impact is limited to isolated ServiceNow instances with minimal data exposure.

🌐 Internet-Facing: HIGH - ServiceNow instances are typically internet-facing for user access, making them directly accessible to attackers without requiring internal network access.
🏢 Internal Only: MEDIUM - Internal instances are still vulnerable but require attacker to have network access, reducing the attack surface compared to internet-facing instances.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated exploitation with high CVSS score (9.8), suggesting relatively straightforward exploitation. No public exploit details available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches and hot fixes detailed in KB1706070

Vendor Advisory: https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1706070

Restart Required: Yes

Instructions:

1. Review ServiceNow KB1706070 for specific patch versions. 2. Apply the appropriate patch or hot fix for your ServiceNow instance version. 3. Restart the ServiceNow instance. 4. Verify the patch was successfully applied.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to ServiceNow instances to only trusted IP addresses and networks

Web Application Firewall Rules

all

Implement WAF rules to block suspicious input patterns and RCE attempts

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ServiceNow instances from critical systems
  • Deploy enhanced monitoring and intrusion detection specifically for ServiceNow traffic and unusual process execution

🔍 How to Verify

Check if Vulnerable:

Check your ServiceNow instance version against the patched versions listed in KB1706070

Check Version:

In ServiceNow, navigate to System Diagnostics > Stats > About to view platform version

Verify Fix Applied:

Verify that your ServiceNow instance is running a patched version from KB1706070 and that no unauthorized changes have been made to the system

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution from ServiceNow components
  • Suspicious input patterns in web server logs
  • Unauthorized file modifications or creations

Network Indicators:

  • Unusual outbound connections from ServiceNow servers
  • Suspicious payloads in HTTP requests to ServiceNow endpoints

SIEM Query:

source="servicenow" AND (process_execution="*cmd*" OR process_execution="*powershell*" OR process_execution="*bash*")

🔗 References

📤 Share & Export