Hackers are ramping up attacks using year-old ServiceNow security bugs to target unpatched systems

Hackers are ramping up attacks using year-old ServiceNow security bugs to target unpatched systems





ServiceNow Vulnerabilities Exploited in Recent Cyberattacks

Cybersecurity researchers have issued urgent warnings about a surge in attacks exploiting outdated ServiceNow vulnerabilities. Three security flaws—tracked as CVE-2024-4879, CVE-2024-5178, and CVE-2024-5217—are being actively targeted by hackers to infiltrate unpatched systems. These vulnerabilities, initially discovered by researchers in May 2024 and patched by ServiceNow two months later, could allow attackers to gain full database access to sensitive corporate data.

Threat intelligence firm GreyNoise reported a significant spike in exploitation attempts over the past week, with most activity directed at Israeli infrastructure. Additional targets include organizations in Germany, Japan, and Lithuania. When chained together, these vulnerabilities enable unauthorized access to employee records, HR data, and other confidential information stored on ServiceNow instances, which are widely used by enterprises for internal operations.

Although ServiceNow stated it has not detected any customer impact from recent campaigns, cybersecurity experts emphasize that unpatched systems remain at high risk. Earlier reports from Resecurity revealed previous exploitation attempts against energy firms, government agencies, and tech companies, while Imperva documented over 6,000 attacks targeting financial services and other sectors in mid-2024.

Organizations are urged to apply ServiceNow’s 2024 security updates immediately to mitigate exposure. Continuous monitoring and patching of legacy systems are critical to defending against evolving threats targeting these vulnerabilities.


Share this article

Subscribe

By pressing the Subscribe button, you confirm that you have read our Privacy Policy.
Your Ad Here
Ad Size: 336x280 px

Leave a Reply

Your email address will not be published. Required fields are marked *