ServiceNow Platform Vulnerability Let Attackers Exfiltrate Sensitive Data

Varonis Threat Labs reports that the Count(er) Strike vulnerability affects ServiceNow’s Access Control List (ACL) mechanism, which manages data access through four key conditions: required roles, security attribute conditions, data conditions, and script conditions. The vulnerability impacts multiple ServiceNow solutions including IT Service Management (ITSM), Customer Service Management (CSM), and Human Resources Service Delivery (HRSD), potentially exposing sensitive data across Fortune 500 companies that comprise 85% of ServiceNow’s customer base. A significant vulnerability in ServiceNow’s platform, designated CVE-2025-3648 and dubbed “Count(er) Strike,” enables attackers to exfiltrate sensitive data, including PII, credentials, and financial information. Security data filters apply additional record-level restrictions based on roles and security attributes, filtering results, and suppressing the “rows removed by security” message that attackers exploited. The vulnerability is further amplified by ServiceNow’s dot-walking feature, which allows access to related tables through reference fields, and self-registration capabilities that enable anonymous users to create accounts and gain basic access. When access is denied due to failing the first two conditions, ServiceNow displays a blank page with “Security constraints prevent access to requested page”.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 10 Jul 2025 15:55:12 +0000


Cyber News related to ServiceNow Platform Vulnerability Let Attackers Exfiltrate Sensitive Data

How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
1 year ago Aws.amazon.com
ServiceNow quietly fixes 8-year-old data exposure flaw The Register - ServiceNow is issuing a fix for a flaw that exposes data after a researcher published a method for unauthenticated attackers to steal an organization's sensitive files. Security researcher Aaron Costello highlighted apparent issues with the default ...
1 year ago Theregister.com
ServiceNow Platform Vulnerability Let Attackers Exfiltrate Sensitive Data - Varonis Threat Labs reports that the Count(er) Strike vulnerability affects ServiceNow’s Access Control List (ACL) mechanism, which manages data access through four key conditions: required roles, security attribute conditions, data conditions, ...
2 months ago Cybersecuritynews.com CVE-2025-3648
ServiceNow Enhances Open Source Security With Snyk Integration - As open source software is increasingly used in application development, ServiceNow is taking steps to enhance the security of open source applications by integrating the Snyk platform into its IT Service Management system. This integration will ...
2 years ago Csoonline.com
Bishop Fox Announces Cosmos Integration With ServiceNow - PHOENIX, AZ – September 26, 2024 – Bishop Fox, the leading authority in offensive security, today announced Cosmos for ServiceNow, developed in partnership with ServiceNow to enable customers to effortlessly sync validated exposures from the ...
1 year ago Darkreading.com
How Servicenow Detects Open Source Security Vulnerabilities - Servicenow, a digital workflow company, recently announced their integration with Synk, an open source security platform, to detect security vulnerabilities in open source software. This integration will enable Servicenow customers to detect and ...
2 years ago Csoonline.com
Verve Integration with ServiceNow - Verve's Service Graph Connector for ServiceNow provides customers integrated visibility and actionability across IT and OT assets. Verve's unique endpoint management architecture extends ServiceNow's capabilities into the OT environment. Verve's ...
2 years ago Verveindustrial.com
Key Breakthroughs from RSA Conference 2025 - Day 1 - Sumo Logic unveiled intelligent security operations with capabilities like detection-as-code (bringing DevSecOps to threat detection), UEBA historical baselining (improving accuracy by learning behavior over time), multiple threat intelligence feeds, ...
5 months ago Cybersecuritynews.com Inception
Penetration Testing for Sensitive Data Exposure in Enterprise Networks: Everything You Need to Know! - The amount of data enterprises store is much bigger than SMBs. A lot of this data includes sensitive information of customers and clients such as bank details, social security numbers, emails, contact numbers, etc. For those new to data security, ...
1 year ago Securityboulevard.com
CVE-2022-36407 - Insertion of Sensitive Information into Log File vulnerability in Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500, Hitachi Virtual Storage Platform G1000, G1500, Hitachi Virtual Storage Platform F1500, Hitachi Virtual ...
1 year ago
When a Data Mesh Doesn't Make Sense - The data mesh is a thoughtful decentralized approach that facilitates the creation of domain-driven, self-service data products. Data mesh-including data mesh governance-requires the right mix of process, tooling, and internal resources to be ...
1 year ago Feeds.dzone.com
Building a Sustainable Data Ecosystem - Finally, I outline future research and policy refinement directions, advocating for a collaborative and responsible approach to building a sustainable data ecosystem in generative AI. In recent years, generative AI has emerged as a transformative ...
1 year ago Feeds.dzone.com
InfoWorld's 2023 Technology of the Year Award winners - The arrival of ChatGPT in late 2022 and the ensuing cascade of large language models ensured that 2023 will forever be known as the year of generative AI. With amazing speed, generative AI has rippled across the entire information technology ...
1 year ago Infoworld.com Rocke
Data Classification Software Features to Look Out For - For organizations looking to improve their data protection and data compliance strategies, technology is essential. Implementation of the right software can help you gain visibility into your company's data, improving your ability to protect customer ...
1 year ago Securityboulevard.com
Aim for a modern data security approach - Risk, compliance, governance, and security professionals are finally realizing the importance of subjecting sensitive workloads to robust data governance and protection the moment the data begins traversing the data pipeline. Why current data ...
1 year ago Helpnetsecurity.com
CVE-2024-4879 - ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now ...
1 year ago
CVE-2024-8923 - ServiceNow has addressed an input validation vulnerability that was identified in the Now Platform. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. ServiceNow deployed an ...
11 months ago
CVE-2024-8924 - ServiceNow has addressed a blind SQL injection vulnerability that was identified in the Now Platform. This vulnerability could enable an unauthenticated user to extract unauthorized information. ServiceNow deployed an update to hosted instances, and ...
11 months ago
Data Classification: Your 5 Minute Guide - Data classification has become a vital component of data security governance. With the rise of virtual data networks, organizations must take necessary measures to protect and secure confidential information. Data classification is the process of ...
2 years ago Tripwire.com
Best Network Security Companies for CISOs - 2025 - This guide has spotlighted the top 10 network security companies—each excelling in specific domains such as zero trust, endpoint protection, AI-driven analytics, and cloud-native security. Zscaler offers a cloud-native security platform that ...
3 months ago Cybersecuritynews.com
Decoding the data dilemma: Strategies for effective data deletion in the age of AI - Businesses today have a tremendous opportunity to use data in new ways, but they must also look at what data they keep and how they use it to avoid potential legal issues. Forrester predicts a doubling of unstructured data in 2024, driven in part by ...
1 year ago Venturebeat.com
How Much Data Does Streaming Use? - As we enjoy the instant gratification, it's important to know how much data streaming uses to avoid data caps. Read on to understand streaming data usage and learn some tips to manage that usage. Data usage refers to the amount of data consumed ...
1 year ago Pandasecurity.com
Data Loss Prevention for Business: Strategies and Tools - Data Loss Prevention has become crucial in today's data-driven business landscape to protect sensitive information. This discussion aims to provide valuable insights into DLP strategies and tools for business, helping mitigate data loss risks ...
1 year ago Securityzap.com
10 Best IT Asset Management Tools - 2025 - What is Good?What Could Be Better?Atera can seamlessly service and monitor Linux, Mac, and Windows systems.Sometimes, when deploying an update, patch management will fail.Using an administrator terminal, keep an eye on IT asset activity remotely.The ...
6 months ago Cybersecuritynews.com
Business Data Privacy Laws: Compliance and Beyond - Governments worldwide have implemented strict data privacy laws to protect individuals' information in the face of increasing cyber threats and data breaches. Let's dive into the world of business data privacy laws as we navigate the complexities of ...
1 year ago Securityzap.com

Cyber Trends (last 7 days)