In late July 2024, the US Cybersecurity and Infrastructure Security Agency (CISA) added two critical vulnerabilities (CVE-2024-4789 and CVE-2024-5217) affecting ServiceNow to its list of known exploited vulnerabilities. These vulnerabilities can allow unauthenticated users to execute code remotely, posing severe risks to organizations that use the platform. The potential for unauthorized access and severe data breaches makes addressing these vulnerabilities crucial.
CVE-2024-4789 and CVE-2024-5217 are vulnerabilities in the ServiceNow platform, both with critical Common Vulnerability Scoring System (CVSS) scores of 9.3 and 9.2, respectively. CVE-2024-4789 is due to improper input validation, while CVE-2024-5217 involves an incomplete list of disallowed inputs. Exploiting these vulnerabilities could allow attackers to bypass security mechanisms, execute remote code, and even gain unauthorized administrative privileges, potentially leading to a complete server takeover.
ServiceNow identified weakness enumeration CWE-2187 in vulnerability CVE-2024-4789 and CWE-184 in vulnerability CVE-2024-5217. The National Institute of Standards and Technology (NIST) also identified weakness enumeration CWE-697 in vulnerability CVE-2024-5217 and is still conducting analysis for an additional, unnamed CWE in vulnerability CVE-2024-4789.
Failure to address these vulnerabilities could lead to severe consequences, including data breaches, service disruptions, or total loss of control over your IT infrastructure. As attackers can leverage these vulnerabilities to impersonate authenticated users, organizations must act swiftly to mitigate the risks associated with CVE-2024-4789 and CVE-2024-5217.


If you or one of your vendors uses ServiceNow, you should ensure you’re using the latest version and then prepare to carry out the next steps around risk mitigation and incident response. If you detect a vendor at risk of either of these vulnerabilities, you can send a remediation request directly within UpGuard, allowing the technology owner to understand the tool's current state and the necessary steps to achieve comprehensive remediation.
UpGuard’s vulnerabilities module helps you mitigate security threats proactively by automatically detecting risks across your internal infrastructure from exposed information in your HTTP headers, website content, open ports, and other common attack vectors. With our third-party monitoring feature, you’ll also be able to identify potential risks and known vulnerabilities across your vendor network.
UpGuard provides a comprehensive approach to vulnerability scanning and continuous security monitoring by automatically detecting risks across your internal infrastructure and across your vendor ecosystem: