CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-8923

Critical Severity
Servicenow
SVRS
84/100

CVSSv3
9.8/10

EPSS
0.00162/1

CVE-2024-8923 is a critical vulnerability in the ServiceNow Now Platform allowing unauthenticated remote code execution. This input validation flaw could let attackers run arbitrary code on the Now Platform without needing login credentials. With a SOCRadar Vulnerability Risk Score (SVRS) of 84, this vulnerability demands immediate attention and patching. The high SVRS, boosted by real-world threat intelligence, indicates active exploitation attempts and elevated risk. Successful exploitation poses a serious threat to data integrity and system availability. Organizations using ServiceNow should apply the available patches and hotfixes immediately to mitigate this critical risk.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:N
UI:N
S:U
C:H
I:H
A:H
2024-10-29

2024-11-07
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-8923 is an input validation vulnerability in the ServiceNow platform that allows unauthenticated remote code execution. This vulnerability has a CVSS score of 9.8, indicating its critical severity. The SOCRadar Vulnerability Risk Score (SVRS) for this CVE is 0, which means that it is not currently being actively exploited.

Key Insights

  • This vulnerability could allow an attacker to gain complete control of a ServiceNow instance, including the ability to access sensitive data, modify configurations, and execute arbitrary code.
  • The vulnerability is easy to exploit and requires no special skills or knowledge.
  • ServiceNow has released a patch for this vulnerability, and all users are urged to apply it as soon as possible.

Mitigation Strategies

  • Apply the patch released by ServiceNow.
  • Restrict access to the ServiceNow platform to only authorized users.
  • Implement input validation controls to prevent malicious input from being processed.
  • Monitor the ServiceNow platform for suspicious activity.

Additional Information

  • The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about this vulnerability, calling for immediate and necessary measures.
  • There are no known active exploits for this vulnerability.
  • If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-8923 | ServiceNow Now Platform improper authentication (KB1706070)
vuldb.com2024-10-29
CVE-2024-8923 | ServiceNow Now Platform improper authentication (KB1706070) | A vulnerability was found in ServiceNow Now Platform. It has been classified as very critical. Affected is an unknown function. The manipulation leads to improper authentication. This vulnerability is traded as CVE-2024-8923. It is possible to launch the attack remotely. There is no exploit available. It is recommended to apply a patch to fix this issue.
vuldb.com
rss
forum
news

Social Media

Warning: #ServiceNow patched a #Critical #CVE-2024-8923 #RCE vulnerability potentially allowing an unauthenticated attacker to execute code in the Now platform. Update now: https://t.co/hIZXe4r7eY #Patch #Patch #Patch
0
0
0
🚨 New Alert! Critical #ServiceNow vulnerabilities (CVE-2024-8923) have been identified. If you use the NOW Platform, ensure your systems are protected against unauthorized access. Dive into the details and safeguard your data. 📌 Read More: https://t.co/NBo8ZGESj3 https://t.co/jluK7T9nCS
0
0
0

Affected Software

Configuration 1
TypeVendorProduct
AppServicenowservicenow

References

ReferenceLink
[email protected]https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1706070

CWE Details

CWE IDCWE NameDescription
CWE-94Improper Control of Generation of Code ('Code Injection')The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence