Critical ServiceNow vulnerabilities exploited in ‘global reconnaissance campaign’
Threat actors are actively exploiting vulnerabilities in the ServiceNow platform, with reports of hackers already posting personal data on the dark web


Three critical vulnerabilities discovered on the ServiceNow platform, which can be chained to to enable full database and server access, are under active exploitation, according to new analysis.
The flaws were first disclosed by attack surface management firm AssetNote in May, and affect various versions of the business transformation platform, including its Utah, Vancouver, and Washington DC releases.
The first two, CVE-2024-4879 and CVE-2024-5217, are both input validation vulnerabilities that could allow unauthenticated remote attackers to execute arbitrary code on the Now Platform.
This could potentially lead to compromise, data theft, and major disruption to business operations, according to security firm Resecurity, explaining their CVSS ratings of 9.3 and 9.2 respectively.
The third flaw, CVE-2024-5178, is a sensitive file read vulnerability rated a 6.9 on the CVSS, which could be used to gain unauthorized access to files on the web application server including email addresses, hashed passwords, and other sensitive data.
The moderate severity rating is due to the fact that this flaw requires the attacker to have gained administrative privileges, but when chained together, the three bugs could give an attacker access to all your ServiceNow data, AssetNote warned.
ServiceNow released patches for the flaws on 14 May, when it was notified by AssetNote, but a proof-of-concept exploit for each appeared immediately after AssetNote published their report on the vulnerabilities.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Active exploitation underway, with potentially 300k vulnerable ServiceNow instances
In a blog post published on 24 July, Resecurity used the network search engine FOFA to estimate that there are around 300,000 ServiceNow instances that could be potentially probed remotely by attackers, with the lion’s share of instances identified located in the US, UK, India, and the EU.
Resecurity said it has observed multiple threat actors looking to exploit the flaws in the wild, particularly CVE-2024-4879
“Our network sensors logged multiple probing requests, enabling attackers to confirm whether a specific ServiceNow instance was vulnerable before actively exploiting it.”
Resecurity found that over a one week period following the disclosure of the vulnerability, multiple organizations were targeted across various regions and verticals.
RELATED WHITEPAPER
These include a government agency in the Middle East, an energy corporation, data center organization, and software development house, and Resecurity noted some of these organizations were not aware of the released patch.
Security firm Imperva released its own report on 23 July warning that it had observed exploitation attempts leveraging the three vulnerabilities across over 6,000 sites across various industries, but targeting the financial services sector in particular.
It added that the attackers are primarily using automated tools to target login pages, aiming to deploy with two payloads. The first to test if remote code execution is possible and the second to reveal database users and their passwords.
The stolen data could be used for further targeting and cyber espionage, the report stated, adding that it is expected that threat actors will increasingly target ServiceNow and similar platforms.
Moreover, Initial access brokers will likely already be looking to monetize access to compromised enterprise portals and applications.
One threat actor has already listed collected email addresses, and the associated hashes for over 105 ServiceNow databases or sale on popular dark web forum BreachForums, according to reporting from Dark Reading.

Solomon Klappholz is a former staff writer for ITPro and ChannelPro. He has experience writing about the technologies that facilitate industrial manufacturing, which led to him developing a particular interest in cybersecurity, IT regulation, industrial infrastructure applications, and machine learning.
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd
-
Old ServiceNow vulnerabilities could cause havoc for unpatched customers
News Organizations that failed to apply ServiceNow patches last year are continuing to fall victim
By Emma Woollacott
-
The big book of selling data protection
Whitepaper Agile risk management starts with a common language
By ITPro
-
Detection is not enough: Exposed assets require rapid mitigation to reduce and eliminate risk
Whitepaper Agile risk management starts with a common language
By ITPro
-
The Forrester Wave™: Third-party risk management platforms, Q1 2024
Whitepaper Customer service insights in the GenAI era
By ITPro
-
Customer insights: Customer experience testimonials
Whitepaper Learn how enterprises like yours drive seamless experiences while reducing costs
By ITPro
-
Business value of ServiceNow customer service management
Whitepaper Reduce costs while delivering seamless experiences by connecting your teams, systems, and digital workflows on a single platform
By ITPro
-
Security operations use case guide
Whitepaper Improve your cyber resilience and vulnerability management while speeding up response times
By ITPro
-
Creating a proactive, risk-aware defense to thrive in today’s dynamic risk environment
Whitepaper Agile risk management starts with a common language
By ITPro