ServiceNow Critical Vulnerability - 20241101001¶
Overview¶
ServiceNow has released advisories that address an input validation vulnerability that was identified in the Now Platform releases prior to Xanadu General Availability. This vulnerability could potentially enable an unauthenticated user to remotely execute code within the context of the Now Platform.
What is vulnerable?¶
Product(s) Affected | Version(s) | CVE # | CVSS v4/v3 | Severity |
---|---|---|---|---|
Now Platform | - Xanadu lower than Patch 1 - Washington DC Patch 4 lower than Hot Fix 1a - Vancouver Patch 9 lower than Hot Fix 2a |
CVE-2024-8923 | 9.3 | Critical |
Now Platform | - Xanadu lower than GA Release - Washington DC Patch 4 lower than Hot Fix 2b - Washington DC Patch 6 lower than Hot Fix 1 - Vancouver Patch 9 lower than Hot Fix 3b - Vancouver Patch 10 lower than Hot Fix 2 |
CVE-2024-8924 | 8.7 | High |
What has been observed?¶
There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.
Recommendation¶
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 hours... (refer Patch Management):
- ServiceNow CVE-2024-8923: https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1706070
- ServiceNow CVE-2024-8924: https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1706072