CVE-2024-5217

July 10, 2024, 5:15 p.m.

None
No Score

Description

ServiceNow has addressed an input validation vulnerability that was identified in the Washington DC, Vancouver, and earlier Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. The vulnerability is addressed in the listed patches and hot fixes below, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.

Product(s) Impacted

Product Versions
ServiceNow
  • ['Washington DC', 'Vancouver', 'and earlier Now Platform releases']

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-184
Incomplete List of Disallowed Inputs
The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are not allowed by policy or otherwise require other action to neutralize before additional processing takes place, but the list is incomplete, leading to resultant weaknesses.

Timeline

Published: July 10, 2024, 5:15 p.m.
Last Modified: July 10, 2024, 5:15 p.m.

Status : Received

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

psirt@servicenow.com

Relations

Here is the list of observables linked to the vulnerability CVE-2024-5217 using threat intelligence.

Linked Attack Reports

People's Republic of China-Linked Actors Compromise Routers and IoT Devices for Botnet Operations

PRC-linked cyber actors have compromised thousands of Internet-connected devices to create a botnet for malicious activities. Integrity Technology Group, a PRC-based company with government links, has controlled a botnet of over 260,000 devices since mid-2021. The botnet uses Mirai-based malware to…
china
ddos
iot
botnet
cyber espionage
mirai
CVE-2024-29973
CVE-2024-4577
CVE-2024-5217
routers
CVE-2023-3519
CVE-2023-46604
CVE-2023-46747
2024-10-02
CVE-2023-43478
CVE-2023-3852
CVE-2023-36844
network compromise
CVE-2024-29269
CVE-2023-36542
CVE-2023-35885
CVE-2024-21762
CVE-2023-38035
CVE-2023-35843
CVE-2023-37582
CVE-2023-38646
CVE-2023-50386
CVE-2023-47218
Published: October 2, 2024
Linked vulnerabilities : CVE-2024-29973 (CVSS 9.8), CVE-2024-4577 (CVSS 9.8), CVE-2024-5217, CVE-2021-44228, CVE-2023-46604, CVE-2023-22515, CVE-2022-26134, CVE-2022-42475, CVE-2022-1388, CVE-2023-22527, CVE-2023-3519, CVE-2023-27997, CVE-2023-46747, CVE-2023-43478, CVE-2023-37582, CVE-2023-36542, CVE-2023-35885, CVE-2023-35843, CVE-2023-35081, CVE-2023-34960, CVE-2023-34598, CVE-2023-3368, CVE-2023-33510, CVE-2023-30799, CVE-2023-28365, CVE-2023-26469, CVE-2023-23333, CVE-2022-3590, CVE-2022-40881, CVE-2022-20707, CVE-2021-46422, CVE-2021-45511, CVE-2021-36260, CVE-2021-28799, CVE-2021-1473, CVE-2021-1472, CVE-2020-4450, CVE-2020-35391, CVE-2020-3451, CVE-2019-12168, CVE-2019-11829, CVE-2018-18852, CVE-2017-7876, CVE-2019-19824, CVE-2024-29269, CVE-2021-20090, CVE-2015-7450, CVE-2022-31814, CVE-2023-38035, CVE-2019-17621, CVE-2023-36844, CVE-2022-30525, CVE-2023-28771, CVE-2023-47218, CVE-2023-50386, CVE-2024-21762, CVE-2023-4166, CVE-2023-3852, CVE-2023-38646, CVE-2023-27524, CVE-2023-24229, CVE-2023-25690, CVE-2020-3452, CVE-2019-7256, CVE-2020-8515, CVE-2020-15415
Downloadable IOCs: 169

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.