top of page

CVE-2025-12420: Critical ServiceNow Flaw Enables Unauthenticated Impersonation

  • Jan 13
  • 2 min read

Key Findings


  • A critical vulnerability (CVE-2025-12420) has been discovered in the ServiceNow AI Platform, allowing unauthenticated attackers to impersonate legitimate users.

  • The vulnerability has a severity score of 9.3 out of 10 and poses a significant risk of privilege escalation.

  • ServiceNow has released security updates to address the flaw, but self-hosted customers and partners need to take immediate action.


Background


  • The vulnerability, dubbed CVE-2025-12420, is a failure in authentication checks that could enable an unauthenticated user to impersonate another user and perform the operations that the impersonated user is entitled to perform.

  • The flaw was discovered by the SaaS security firm AppOmni, with collaboration from researcher Aaron Costello.

  • The vulnerability affects specific ServiceNow Store Applications, including Now Assist AI Agents (sn_aia) and Virtual Agent API (sn_va_as_service).


Impact


  • Successful exploitation could lead to unauthorized access to sensitive corporate data, disruption of IT operations, and compromise of business processes automated via Now Assist AI Agents.

  • The impersonation capability allows attackers to bypass normal authentication and authorization controls, potentially leading to data breaches involving personal data protected under GDPR.

  • Operationally, attackers could manipulate workflows, escalate privileges, or disrupt service delivery, impacting business continuity.

  • The risk is heightened in sectors with stringent compliance requirements, such as finance, healthcare, and government agencies prevalent across Europe.


Mitigation Recommendations


  • Organizations should immediately verify if they are running the affected version of ServiceNow Now Assist AI Agents and apply the official security updates released by ServiceNow.

  • Access to AI agent functionalities should be restricted to the minimum necessary users, and multi-factor authentication (MFA) should be enforced for all administrative and privileged accounts.

  • Network segmentation and firewall rules should limit exposure of ServiceNow instances to trusted networks only.

  • Regular security assessments and penetration testing focused on ServiceNow environments can help identify residual risks.

  • Organizations should review and update incident response plans to include scenarios involving AI agent impersonation attacks.


Sources


  • https://securityonline.info/ai-identity-theft-critical-servicenow-flaw-cve-2025-12420-allows-unauthenticated-impersonation/

  • https://radar.offseq.com/threat/cve-2025-12420-vulnerability-in-servicenow-now-ass-62928d94

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page