Article Details
Scrape Timestamp (UTC): 2025-07-09 13:06:37.351
Original Article Text
Click to Toggle View
New ServiceNow flaw lets attackers enumerate restricted data. A new vulnerability in ServiceNow, dubbed Count(er) Strike, allows low-privileged users to extract sensitive data from tables to which they should not have access. ServiceNow is a cloud-based platform that enables organizations to manage digital workflows for their enterprise operations. It is widely adopted across various industries, including public sector organizations, healthcare, financial institutions, and large enterprises. The flaw was discovered by Varonis Threat Labs in February 2025 and assigned the CVE-2025-3648 identifier, and may impact configurations with misconfigured or overly permissive ACLs. ServiceNow released additional access control frameworks in the Xanadu and Yokohama versions, released last month, to address the issue. However, all admins should review existing tables to ensure their data is properly locked down. The Count(er) Strike flaw ServiceNow utilizes Access Control Lists (ACLs) to restrict access to data within its tables. Each ACL evaluates four conditions when determining if a user should have access to a specific resource: For a user to gain access to a resource, all of these conditions must be satisfied. However, if a resource is protected with multiple ACLs, ServiceNow previously used an "Allow if" condition, meaning that if a user satisfied just one ACL, they could gain access, even if other ACLs would have blocked them. In some cases, this granted full access. However, in others, it allowed partial access, such as record counts that could be exploited, as explained later in the article. "Each resource or table in ServiceNow can have numerous ACLs, each defining different conditions for access," explains the Varonis report.. "However, if a user passes just one ACL, they gain access to the resource, even if other ACLs might not grant access. If there is no ACL present for the resource, access will default to the default access property which is set to deny in most cases." This permissive model led Varonis to discover that it was possible to gain partial access, which could be used to enumerate protected data, even though the user may have failed more restrictive ACLs. Varonis found that if a user fails the data condition or script condition, ServiceNow still returns the record count in the UI and source HTML. The page also states that some results were removed due to security constraints. With this partial data, Varonis began manipulating URL-based filters, such as STARTSWITH, CONTAINS, =, and != to enumerate the contents of records one character or condition at a time. For example: Repeating this process with different values and queries allows for the retrieval of data one character or digit at a time. To automate this procedure, Varonis created a script that successfully enumerated data records from a table to which they had limited access. Even when record data isn't displayed, the record count leaks enough information to determine fields, including credentials, PII, and internal configuration data. Varonis warned that self-registered users could also use this attack. Self-registration is a feature that allows users to create accounts and access the instance with minimal privileges, which can still be used to launch an attack. "Though it is rare for instances to allow anonymous registration and access, this configuration was found in the ServiceNow systems of several Fortune 500 companies," warned Varonis. Mitigating the attack Varonis told BleepingComputer that they tested the attack against ServiceNow's ITSM product, but stated that it should also apply to all ServiceNow products that utilize the same ACL logic. ServiceNow has now addressed the attack by: However, customers should still manually review their tables and modify ACLs to make sure they are not overly permissive, and thus vulnerable to this attack. Varonis says that it has not seen any evidence that this vulnerability has been exploited in the wild. 8 Common Threats in 2025 While cloud attacks may be growing more sophisticated, attackers still succeed with surprisingly simple techniques. Drawing from Wiz's detections across thousands of organizations, this report reveals 8 key techniques used by cloud-fluent threat actors.
Daily Brief Summary
A vulnerability in ServiceNow, identified as CVE-2025-3648, enables low-privileged users to access sensitive data inappropriately.
Discovered by Varonis Threat Labs in February 2025, the flaw exploits misconfigured Access Control Lists (ACLs).
Even if one ACL condition is met, users could access protected resources, contrary to intended restrictions.
ServiceNow has updated its ACL frameworks with the releases of its Xanadu and Yokohama versions to mitigate this issue.
Organizations are advised to manually review ACL configurations to ensure data security.
Despite the fixes, the manipulation of URL-based filters can still enumerate data character by character.
Vulnerability could impact multiple industries using ServiceNow, including healthcare, finance, and public sectors.
No current evidence suggests the flaw has been exploited in real-world attacks, but monitoring and updates are recommended.