CVE-2025-62607

5.3 MEDIUM

📋 TL;DR

An information disclosure vulnerability in Nautobot SSoT app versions before 3.10.0 allows unauthenticated attackers to view the ServiceNow public instance name (e.g., companyname.service-now.com). This affects organizations using vulnerable versions of the Nautobot SSoT app with internet-facing deployments or insufficient access controls.

💻 Affected Systems

Products:
  • Nautobot Single Source of Truth (SSoT) app
Versions: All versions before 3.10.0
Operating Systems: All platforms running Nautobot
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments where the SSoT app is installed and the vulnerable configuration page is accessible without authentication.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could identify ServiceNow instance names, potentially enabling targeted phishing or reconnaissance for follow-on attacks against the ServiceNow environment.

🟠

Likely Case

Low-value information disclosure revealing organizational ServiceNow instance naming conventions, which could assist in social engineering or targeted attacks.

🟢

If Mitigated

No impact if proper network segmentation and authentication controls prevent unauthenticated access to the vulnerable endpoint.

🌐 Internet-Facing: MEDIUM - While only low-value information is exposed, it still provides reconnaissance data to attackers.
🏢 Internal Only: LOW - Internal attackers would already have access to similar information through normal business operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires direct HTTP access to the vulnerable configuration page without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.10.0

Vendor Advisory: https://github.com/nautobot/nautobot-app-ssot/security/advisories/GHSA-535g-62r7-cx6v

Restart Required: No

Instructions:

1. Update Nautobot SSoT app to version 3.10.0 or later using pip: 'pip install nautobot-ssot>=3.10.0' 2. Verify the update completed successfully 3. No service restart required for Nautobot

🔧 Temporary Workarounds

Network Access Control

all

Restrict network access to Nautobot administration interfaces using firewall rules or network segmentation.

Authentication Enforcement

all

Ensure Nautobot requires authentication for all administrative interfaces and configuration pages.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the Nautobot administration interface
  • Ensure Nautobot authentication is properly configured and required for all administrative functions

🔍 How to Verify

Check if Vulnerable:

Check if unauthenticated HTTP GET requests to the SSoT configuration page return ServiceNow instance information.

Check Version:

pip show nautobot-ssot | grep Version

Verify Fix Applied:

Verify that unauthenticated requests to the SSoT configuration page now return authentication required or access denied responses.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to /ssot/config/ or similar SSoT configuration endpoints
  • HTTP 200 responses to unauthenticated configuration page requests

Network Indicators:

  • Unusual traffic patterns to Nautobot administration interfaces from external sources

SIEM Query:

source="nautobot" AND (uri_path="/ssot/config/" OR uri_path="/ssot/") AND http_status=200 AND user="-"

🔗 References

📤 Share & Export