CVE-2024-4879 (GCVE-0-2024-4879)
Vulnerability from cvelistv5 – Published: 2024-07-10 16:16 – Updated: 2025-10-21 22:55
VLAI?
CISA
Summary
ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. ServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.
Severity ?
9.8 (Critical)
CWE
- CWE-1287 - Improper Validation of Specified Type of Input
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ServiceNow | Now Platform |
Affected:
0 , < Utah Patch 10 Hot Fix 3
(custom)
Affected: 0 , < Utah Patch 10a Hot Fix 2 (custom) Affected: 0 , < Vancouver Patch 6 Hot Fix 2 (custom) Affected: 0 , < Vancouver Patch 7 Hot Fix 3b (custom) Affected: 0 , < Vancouver Patch 8 Hot Fix 4 (custom) Affected: 0 , < Vancouver Patch 9 (custom) Affected: 0 , < Vancouver Patch 10 (custom) Affected: 0 , < Washington DC Patch 1 Hot Fix 2b (custom) Affected: 0 , < Washington DC Patch 2 Hot Fix 2 (custom) Affected: 0 , < Washington DC Patch 3 Hot Fix 1 (custom) Affected: 0 , < Washington DC Patch 4 (custom) |
Credits
Adam Kues
Assetnote Attack Surface Management
CISA Known Exploited Vulnerability
Data from the CISA Known Exploited Vulnerabilities Catalog
Date added: 2024-07-29
Due date: 2024-08-19
Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Used in ransomware: Unknown
Notes: https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1645154; https://nvd.nist.gov/vuln/detail/CVE-2024-4879
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "servicenow",
"vendor": "servicenow",
"versions": [
{
"lessThan": "utah_patch_10_hot_fix_3",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "utah_patch_10a_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_6_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_7_hot_fix_3b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_8_hot_fix_4",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_9",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_10",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_1_hot_fix_2b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_2_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_3_hot_fix_1",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "servicenow",
"vendor": "servicenow",
"versions": [
{
"lessThan": "utah_patch_10_hot_fix_3",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "utah_patch_10a_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_6_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_7_hot_fix_3b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_8_hot_fix_4",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_9",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_10",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_1_hot_fix_2b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_2_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_3_hot_fix_1",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "servicenow",
"vendor": "servicenow",
"versions": [
{
"lessThan": "utah_patch_10_hot_fix_3",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "utah_patch_10a_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_6_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_7_hot_fix_3b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_8_hot_fix_4",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_9",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_10",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_1_hot_fix_2b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_2_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_3_hot_fix_1",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "servicenow",
"vendor": "servicenow",
"versions": [
{
"lessThan": "utah_patch_10_hot_fix_3",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "utah_patch_10a_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_6_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_7_hot_fix_3b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_8_hot_fix_4",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_9",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_10",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_1_hot_fix_2b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_2_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_3_hot_fix_1",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "servicenow",
"vendor": "servicenow",
"versions": [
{
"lessThan": "utah_patch_10_hot_fix_3",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "utah_patch_10a_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_6_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_7_hot_fix_3b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_8_hot_fix_4",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_9",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_10",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_1_hot_fix_2b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_2_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_3_hot_fix_1",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "servicenow",
"vendor": "servicenow",
"versions": [
{
"lessThan": "utah_patch_10_hot_fix_3",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "utah_patch_10a_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_6_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_7_hot_fix_3b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_8_hot_fix_4",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_9",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_10",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_1_hot_fix_2b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_2_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_3_hot_fix_1",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "servicenow",
"vendor": "servicenow",
"versions": [
{
"lessThan": "utah_patch_10_hot_fix_3",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "utah_patch_10a_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_6_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_7_hot_fix_3b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_8_hot_fix_4",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_9",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_10",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_1_hot_fix_2b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_2_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_3_hot_fix_1",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "servicenow",
"vendor": "servicenow",
"versions": [
{
"lessThan": "utah_patch_10_hot_fix_3",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "utah_patch_10a_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_6_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_7_hot_fix_3b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_8_hot_fix_4",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_9",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_10",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_1_hot_fix_2b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_2_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_3_hot_fix_1",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "servicenow",
"vendor": "servicenow",
"versions": [
{
"lessThan": "utah_patch_10_hot_fix_3",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "utah_patch_10a_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_6_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_7_hot_fix_3b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_8_hot_fix_4",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_9",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_10",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_1_hot_fix_2b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_2_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_3_hot_fix_1",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "servicenow",
"vendor": "servicenow",
"versions": [
{
"lessThan": "utah_patch_10_hot_fix_3",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "utah_patch_10a_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_6_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_7_hot_fix_3b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_8_hot_fix_4",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_9",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_10",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_1_hot_fix_2b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_2_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_3_hot_fix_1",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "servicenow",
"vendor": "servicenow",
"versions": [
{
"lessThan": "utah_patch_10_hot_fix_3",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "utah_patch_10a_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_6_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_7_hot_fix_3b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_8_hot_fix_4",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_9",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "vancouver_patch_10",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_1_hot_fix_2b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_2_hot_fix_2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_3_hot_fix_1",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "washington_dc_patch_4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-4879",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-29T18:58:02.257329Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2024-07-29",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-4879"
},
"type": "kev"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T22:55:49.702Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-4879"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-07-29T00:00:00+00:00",
"value": "CVE-2024-4879 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:55:10.283Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1645154"
},
{
"tags": [
"x_login-required",
"x_transferred"
],
"url": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1644293"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Now Platform",
"vendor": "ServiceNow",
"versions": [
{
"lessThan": "Utah Patch 10 Hot Fix 3",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "Utah Patch 10a Hot Fix 2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "Vancouver Patch 6 Hot Fix 2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "Vancouver Patch 7 Hot Fix 3b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "Vancouver Patch 8 Hot Fix 4",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "Vancouver Patch 9",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "Vancouver Patch 10",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "Washington DC Patch 1 Hot Fix 2b",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "Washington DC Patch 2 Hot Fix 2",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "Washington DC Patch 3 Hot Fix 1",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "Washington DC Patch 4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Adam Kues"
},
{
"lang": "en",
"type": "finder",
"value": "Assetnote Attack Surface Management"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform.\u003c/span\u003e\u0026nbsp;\u003c/span\u003eServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.\u003cdiv\u003e\u003c/div\u003e"
}
],
"value": "ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform.\u00a0ServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1287",
"description": "CWE-1287 Improper Validation of Specified Type of Input",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-29T22:28:49.374Z",
"orgId": "303448ea-6ef3-4077-ad29-5c9bf253c375",
"shortName": "SN"
},
"references": [
{
"url": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1645154"
},
{
"tags": [
"x_login-required"
],
"url": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1644293"
},
{
"url": "https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Jelly Template Injection Vulnerability in ServiceNow UI Macros",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "303448ea-6ef3-4077-ad29-5c9bf253c375",
"assignerShortName": "SN",
"cveId": "CVE-2024-4879",
"datePublished": "2024-07-10T16:16:39.926Z",
"dateReserved": "2024-05-14T17:39:41.655Z",
"dateUpdated": "2025-10-21T22:55:49.702Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2024-4879",
"cwes": "[\"CWE-1287\"]",
"dateAdded": "2024-07-29",
"dueDate": "2024-08-19",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1645154; https://nvd.nist.gov/vuln/detail/CVE-2024-4879",
"product": "Utah, Vancouver, and Washington DC Now Platform",
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"shortDescription": "ServiceNow Utah, Vancouver, and Washington DC Now Platform releases contain a jelly template injection vulnerability in UI macros. An unauthenticated user could exploit this vulnerability to execute code remotely. ",
"vendorProject": "ServiceNow",
"vulnerabilityName": "ServiceNow Improper Input Validation Vulnerability"
},
"fkie_nvd": {
"cisaActionDue": "2024-08-19",
"cisaExploitAdd": "2024-07-29",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "ServiceNow Improper Input Validation Vulnerability",
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"69E0078E-1953-4F4F-9D5A-B1A140C4B310\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:early_availability:*:*:*:*:*:*\", \"matchCriteriaId\": \"03FE0B52-C7A6-4632-A09E-BE7AB8610DD7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB5CA109-5DC1-4952-AC15-69FAC332BCA2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"44506775-0370-4583-9236-6C9F646B6622\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_1a:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A76B918-45DB-49A9-B323-5CB6FF8200AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_1b:*:*:*:*:*:*\", \"matchCriteriaId\": \"118B4618-8702-4C38-88EE-B41C2C9DBF31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"92BED123-0FFC-4113-B0B6-A1A8BD69F4CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_10:*:*:*:*:*:*\", \"matchCriteriaId\": \"76439FC6-2DD2-4AD4-9EB6-A2FEAC10B205\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_10_hotfix_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"8097D9B0-9329-4EB7-BB7E-0FF3057D408B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_10_hotfix_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"AFEA8D14-D1C8-486B-ABE7-25C9D6B72CE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_10a:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DA716A2-E697-4BC3-8127-E772E67E1C49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_10a_hotfix_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"EEBB1DCE-25AA-4F95-984C-5BB5341A90ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"98E3E0AF-A341-43BB-91C6-75BBDE695280\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"20AC3991-0E5B-4164-807F-0E270B1867BE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"44F86BEB-77D0-41AF-816C-F73B2D9601FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9C467AA-B1A2-4A2A-8363-623232BCBCA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_4:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6E189F6-6623-4A0C-8767-A3CC1C12B759\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D6885DD-230B-468B-B936-7512BE80849D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_3_hotfix_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"1476C240-FCB0-43E3-9C79-2264DB6C200A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_3_hotfix_1b:*:*:*:*:*:*\", \"matchCriteriaId\": \"9783CA53-CDBD-44F0-B2B9-8C49EBE9FCB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_4:*:*:*:*:*:*\", \"matchCriteriaId\": \"481EC1AA-5863-4641-B67F-CD51416ED0EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"402D816A-2650-4743-A386-029C0D063C39\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"56CBE65E-2D5A-4191-A2F4-8AC76050404F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2a:*:*:*:*:*:*\", \"matchCriteriaId\": \"05587BC2-574F-42B6-A121-7ACFD0691ED5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2b:*:*:*:*:*:*\", \"matchCriteriaId\": \"76D69B8D-02EE-4E3D-9F54-E94F6DB09D5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC772DD6-2814-4EEF-A524-CC752C277337\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_3b:*:*:*:*:*:*\", \"matchCriteriaId\": \"996C57B4-E8AC-48F6-BA71-328F714B1BAC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_4:*:*:*:*:*:*\", \"matchCriteriaId\": \"10B82BE2-BE38-4EA7-85D5-AC28FF4F50BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_4b:*:*:*:*:*:*\", \"matchCriteriaId\": \"D66B18D1-486D-4390-9D1E-5348D1C6729A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_5:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0EC8ACE-70CA-44FC-ACA7-0868D620C86D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_5:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D934721-565F-4707-A32A-B7E4BB9D2DD0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_5_hotfix_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AA97D74-290C-47C7-9976-6EF83950C530\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_6:*:*:*:*:*:*\", \"matchCriteriaId\": \"122E0C17-B29B-44B9-A37E-745B103AD398\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_6_hotfix_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"AADFD5CE-9C9D-46FF-9871-E2BD7B2C8B98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_6_hotfix_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECE96EED-C729-4A84-B437-79CCE029C391\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_7:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BD49264-D243-4625-828C-AF383D826779\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_7_hotfix_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB29FCEC-3DDB-46EE-A7AA-4728E6B9A1D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_7_hotfix_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC4CA2B8-EFD8-4C01-8F9C-E613619062DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_7a:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F601F74-593A-4566-A763-EF05E5138FA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_7b:*:*:*:*:*:*\", \"matchCriteriaId\": \"47D4CC0E-E3F5-49AB-9D92-AC8FFB17A4C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_8:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A4CD267-D72A-4F09-BE9B-F008B1804AD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_8_hotfix_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"24D2EBC6-F894-4C1D-A2FF-B49FF4007ED8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_9:*:*:*:*:*:*\", \"matchCriteriaId\": \"26D23EE3-0F88-47F7-ADCD-B74F81A08D9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB793686-954A-49F8-BC35-A95325D61303\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1a:*:*:*:*:*:*\", \"matchCriteriaId\": \"38DDACA8-69A9-4047-AD99-A7DDC320EAD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1b:*:*:*:*:*:*\", \"matchCriteriaId\": \"926C0F6A-0599-4239-B1CE-5D864BBAA315\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"9DB67FCA-6127-486F-A866-3D5E63B81C35\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9132AB29-33C1-4825-BAD4-2804C26316B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_1_hotfix_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"68D99613-53A1-4B09-9A78-F8EFA0CC6B01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_10:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E79B8B4-C9CF-4BD4-A634-6DB5EFCAA1FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8FCCFB6-DB7E-4DED-A7E0-1C03087754F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"7ED2051C-FE4F-4C0A-A3BF-E33141DC3250\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_1a:*:*:*:*:*:*\", \"matchCriteriaId\": \"8CFD4017-5B8E-4CAF-B9E5-4A675C11F01A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"40D69E69-DF88-4F8C-A9BD-B642829107E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D21A542-15DC-432C-9C60-F7CABE8D4807\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix1a:*:*:*:*:*:*\", \"matchCriteriaId\": \"1596163B-637A-49F9-B01F-C6CC297F7E5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B915FDA-9DCB-43B5-8081-F0690996A3EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"7308FA07-5C6D-41AA-9EE1-EE9BAAB50A1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"5ED407E7-9595-4B4D-9D53-1A4807BA327C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EA5B288-54DB-437E-88C2-05F90FF3C918\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_4:*:*:*:*:*:*\", \"matchCriteriaId\": \"6ED497ED-1588-4CF8-AE83-7CC7BEF8B982\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_4:*:*:*:*:*:*\", \"matchCriteriaId\": \"A74A3197-68F7-4303-A731-B87A8BF3F831\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"A08FD0FD-E062-4BEC-BE95-0ED2D106826B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1a:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F6A6F12-4D7A-4FD3-8FD6-C32D797BB810\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1b:*:*:*:*:*:*\", \"matchCriteriaId\": \"847F9124-F3C6-4C93-9E80-544CB0580C8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_2b:*:*:*:*:*:*\", \"matchCriteriaId\": \"12808B52-8F7D-4EE0-A43E-85A1C70A6BE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_5:*:*:*:*:*:*\", \"matchCriteriaId\": \"81880B84-5E9D-4B7F-B1D5-1BF8D25DAF5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_5_hotfix_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"8011D2A7-770B-4AE5-80E6-C762F4F0BB55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_6:*:*:*:*:*:*\", \"matchCriteriaId\": \"A58603E3-5AFC-4606-8F9E-1B4FF9A9B843\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_6_hotfix_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"BED5F42A-5FFF-43E0-9BAD-A5E6C1110551\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABE64339-EF0B-4430-9768-FA7DE82AA61F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF79CA67-765A-4CCB-B1CB-EE1FC02CFCFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_1a:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3E71353-9AFF-4B6D-89BC-A2909A7C5DDF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9C5B57E-7852-4E38-9BDA-864CF6F9DB5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2a:*:*:*:*:*:*\", \"matchCriteriaId\": \"EAA2E502-FCBC-404D-8FFA-4601F1D5B747\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2b:*:*:*:*:*:*\", \"matchCriteriaId\": \"650956A6-8DE6-4C16-A77C-2B208B41DF5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_3a:*:*:*:*:*:*\", \"matchCriteriaId\": \"A49AC0E0-9164-43AD-959A-55FCB7965858\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_8:*:*:*:*:*:*\", \"matchCriteriaId\": \"C641B881-7379-448A-A785-3381C72F8353\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"03D48963-936B-4A48-8859-A5066A259E03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"9149B850-7196-476A-9A27-DEB85B8C6F19\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"10622260-FCBC-4CC0-804E-55D75200FC46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:vancouver:patch_9:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF44F7A1-D153-4723-BA45-0FE4E4725C2F\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:washington_dc:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFAC3BF9-2443-4C43-B67A-2BB99297D295\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"444DD275-789F-4C07-9D98-BBFAA1640DB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B29B708-BD7C-4A6C-9E78-37D045101A17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F6EDFA3-9014-4AA7-A17F-DDB1FE96588E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2a:*:*:*:*:*:*\", \"matchCriteriaId\": \"1DA447CA-A6A2-436C-9909-3F0419B7DD6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D18E2CD1-AC8E-4ABF-88DE-D3E61A297ED1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2_hotfix_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"52FC3724-35E5-4C3A-B6BA-3B270EA4255E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"6137BB81-6B48-4DCB-A9F6-A27D869C12FC\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform.\\u00a0ServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.\"}, {\"lang\": \"es\", \"value\": \"ServiceNow ha abordado una vulnerabilidad de validaci\\u00f3n de entrada que se identific\\u00f3 en las versiones de la plataforma Now de Vancouver y Washington DC. Esta vulnerabilidad podr\\u00eda permitir que un usuario no autenticado ejecute c\\u00f3digo de forma remota dentro del contexto de Now Platform. ServiceNow aplic\\u00f3 una actualizaci\\u00f3n a las instancias alojadas y ServiceNow lanz\\u00f3 la actualizaci\\u00f3n a nuestros socios y clientes autohospedados. A continuaci\\u00f3n se enumeran los parches y correcciones urgentes que abordan la vulnerabilidad. Si a\\u00fan no lo ha hecho, le recomendamos aplicar los parches de seguridad relevantes para su instancia lo antes posible.\"}]",
"id": "CVE-2024-4879",
"lastModified": "2024-11-27T19:07:32.497",
"metrics": "{\"cvssMetricV40\": [{\"source\": \"psirt@servicenow.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"4.0\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\", \"baseScore\": 9.3, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"vulnerableSystemConfidentiality\": \"HIGH\", \"vulnerableSystemIntegrity\": \"HIGH\", \"vulnerableSystemAvailability\": \"HIGH\", \"subsequentSystemConfidentiality\": \"NONE\", \"subsequentSystemIntegrity\": \"NONE\", \"subsequentSystemAvailability\": \"NONE\", \"exploitMaturity\": \"NOT_DEFINED\", \"confidentialityRequirements\": \"NOT_DEFINED\", \"integrityRequirements\": \"NOT_DEFINED\", \"availabilityRequirements\": \"NOT_DEFINED\", \"modifiedAttackVector\": \"NOT_DEFINED\", \"modifiedAttackComplexity\": \"NOT_DEFINED\", \"modifiedAttackRequirements\": \"NOT_DEFINED\", \"modifiedPrivilegesRequired\": \"NOT_DEFINED\", \"modifiedUserInteraction\": \"NOT_DEFINED\", \"modifiedVulnerableSystemConfidentiality\": \"NOT_DEFINED\", \"modifiedVulnerableSystemIntegrity\": \"NOT_DEFINED\", \"modifiedVulnerableSystemAvailability\": \"NOT_DEFINED\", \"modifiedSubsequentSystemConfidentiality\": \"NOT_DEFINED\", \"modifiedSubsequentSystemIntegrity\": \"NOT_DEFINED\", \"modifiedSubsequentSystemAvailability\": \"NOT_DEFINED\", \"safety\": \"NOT_DEFINED\", \"automatable\": \"NOT_DEFINED\", \"recovery\": \"NOT_DEFINED\", \"valueDensity\": \"NOT_DEFINED\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\"}}], \"cvssMetricV31\": [{\"source\": \"psirt@servicenow.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}]}",
"published": "2024-07-10T17:15:12.117",
"references": "[{\"url\": \"https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1644293\", \"source\": \"psirt@servicenow.com\", \"tags\": [\"Permissions Required\"]}, {\"url\": \"https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1645154\", \"source\": \"psirt@servicenow.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit\", \"source\": \"psirt@servicenow.com\", \"tags\": [\"Press/Media Coverage\", \"Third Party Advisory\"]}, {\"url\": \"https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1644293\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Permissions Required\"]}, {\"url\": \"https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1645154\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Press/Media Coverage\", \"Third Party Advisory\"]}]",
"sourceIdentifier": "psirt@servicenow.com",
"vulnStatus": "Analyzed",
"weaknesses": "[{\"source\": \"psirt@servicenow.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-1287\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-4879\",\"sourceIdentifier\":\"psirt@servicenow.com\",\"published\":\"2024-07-10T17:15:12.117\",\"lastModified\":\"2025-11-03T18:58:11.717\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform.\u00a0ServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.\"},{\"lang\":\"es\",\"value\":\"ServiceNow ha abordado una vulnerabilidad de validaci\u00f3n de entrada que se identific\u00f3 en las versiones de la plataforma Now de Vancouver y Washington DC. Esta vulnerabilidad podr\u00eda permitir que un usuario no autenticado ejecute c\u00f3digo de forma remota dentro del contexto de Now Platform. ServiceNow aplic\u00f3 una actualizaci\u00f3n a las instancias alojadas y ServiceNow lanz\u00f3 la actualizaci\u00f3n a nuestros socios y clientes autohospedados. A continuaci\u00f3n se enumeran los parches y correcciones urgentes que abordan la vulnerabilidad. Si a\u00fan no lo ha hecho, le recomendamos aplicar los parches de seguridad relevantes para su instancia lo antes posible.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"psirt@servicenow.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":9.3,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"psirt@servicenow.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"cisaExploitAdd\":\"2024-07-29\",\"cisaActionDue\":\"2024-08-19\",\"cisaRequiredAction\":\"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\",\"cisaVulnerabilityName\":\"ServiceNow Improper Input Validation Vulnerability\",\"weaknesses\":[{\"source\":\"psirt@servicenow.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1287\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"69E0078E-1953-4F4F-9D5A-B1A140C4B310\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:early_availability:*:*:*:*:*:*\",\"matchCriteriaId\":\"03FE0B52-C7A6-4632-A09E-BE7AB8610DD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB5CA109-5DC1-4952-AC15-69FAC332BCA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"44506775-0370-4583-9236-6C9F646B6622\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_1a:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A76B918-45DB-49A9-B323-5CB6FF8200AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_1b:*:*:*:*:*:*\",\"matchCriteriaId\":\"118B4618-8702-4C38-88EE-B41C2C9DBF31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"92BED123-0FFC-4113-B0B6-A1A8BD69F4CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"76439FC6-2DD2-4AD4-9EB6-A2FEAC10B205\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_10_hotfix_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8097D9B0-9329-4EB7-BB7E-0FF3057D408B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_10_hotfix_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFEA8D14-D1C8-486B-ABE7-25C9D6B72CE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_10a:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DA716A2-E697-4BC3-8127-E772E67E1C49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_10a_hotfix_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEBB1DCE-25AA-4F95-984C-5BB5341A90ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"98E3E0AF-A341-43BB-91C6-75BBDE695280\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"20AC3991-0E5B-4164-807F-0E270B1867BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"44F86BEB-77D0-41AF-816C-F73B2D9601FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9C467AA-B1A2-4A2A-8363-623232BCBCA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E189F6-6623-4A0C-8767-A3CC1C12B759\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D6885DD-230B-468B-B936-7512BE80849D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_3_hotfix_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1476C240-FCB0-43E3-9C79-2264DB6C200A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_3_hotfix_1b:*:*:*:*:*:*\",\"matchCriteriaId\":\"9783CA53-CDBD-44F0-B2B9-8C49EBE9FCB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"481EC1AA-5863-4641-B67F-CD51416ED0EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"402D816A-2650-4743-A386-029C0D063C39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"56CBE65E-2D5A-4191-A2F4-8AC76050404F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2a:*:*:*:*:*:*\",\"matchCriteriaId\":\"05587BC2-574F-42B6-A121-7ACFD0691ED5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2b:*:*:*:*:*:*\",\"matchCriteriaId\":\"76D69B8D-02EE-4E3D-9F54-E94F6DB09D5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC772DD6-2814-4EEF-A524-CC752C277337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_3b:*:*:*:*:*:*\",\"matchCriteriaId\":\"996C57B4-E8AC-48F6-BA71-328F714B1BAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"10B82BE2-BE38-4EA7-85D5-AC28FF4F50BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_4b:*:*:*:*:*:*\",\"matchCriteriaId\":\"D66B18D1-486D-4390-9D1E-5348D1C6729A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0EC8ACE-70CA-44FC-ACA7-0868D620C86D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D934721-565F-4707-A32A-B7E4BB9D2DD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_5_hotfix_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AA97D74-290C-47C7-9976-6EF83950C530\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"122E0C17-B29B-44B9-A37E-745B103AD398\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_6_hotfix_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AADFD5CE-9C9D-46FF-9871-E2BD7B2C8B98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_6_hotfix_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE96EED-C729-4A84-B437-79CCE029C391\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BD49264-D243-4625-828C-AF383D826779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_7_hotfix_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB29FCEC-3DDB-46EE-A7AA-4728E6B9A1D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_7_hotfix_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC4CA2B8-EFD8-4C01-8F9C-E613619062DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_7a:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F601F74-593A-4566-A763-EF05E5138FA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_7b:*:*:*:*:*:*\",\"matchCriteriaId\":\"47D4CC0E-E3F5-49AB-9D92-AC8FFB17A4C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_8:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A4CD267-D72A-4F09-BE9B-F008B1804AD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_8_hotfix_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"24D2EBC6-F894-4C1D-A2FF-B49FF4007ED8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_9:*:*:*:*:*:*\",\"matchCriteriaId\":\"26D23EE3-0F88-47F7-ADCD-B74F81A08D9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB793686-954A-49F8-BC35-A95325D61303\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1a:*:*:*:*:*:*\",\"matchCriteriaId\":\"38DDACA8-69A9-4047-AD99-A7DDC320EAD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1b:*:*:*:*:*:*\",\"matchCriteriaId\":\"926C0F6A-0599-4239-B1CE-5D864BBAA315\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DB67FCA-6127-486F-A866-3D5E63B81C35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9132AB29-33C1-4825-BAD4-2804C26316B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_1_hotfix_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"68D99613-53A1-4B09-9A78-F8EFA0CC6B01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E79B8B4-C9CF-4BD4-A634-6DB5EFCAA1FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8FCCFB6-DB7E-4DED-A7E0-1C03087754F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ED2051C-FE4F-4C0A-A3BF-E33141DC3250\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_1a:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CFD4017-5B8E-4CAF-B9E5-4A675C11F01A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"40D69E69-DF88-4F8C-A9BD-B642829107E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D21A542-15DC-432C-9C60-F7CABE8D4807\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix1a:*:*:*:*:*:*\",\"matchCriteriaId\":\"1596163B-637A-49F9-B01F-C6CC297F7E5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B915FDA-9DCB-43B5-8081-F0690996A3EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7308FA07-5C6D-41AA-9EE1-EE9BAAB50A1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ED407E7-9595-4B4D-9D53-1A4807BA327C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EA5B288-54DB-437E-88C2-05F90FF3C918\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ED497ED-1588-4CF8-AE83-7CC7BEF8B982\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A74A3197-68F7-4303-A731-B87A8BF3F831\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A08FD0FD-E062-4BEC-BE95-0ED2D106826B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1a:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F6A6F12-4D7A-4FD3-8FD6-C32D797BB810\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1b:*:*:*:*:*:*\",\"matchCriteriaId\":\"847F9124-F3C6-4C93-9E80-544CB0580C8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_2b:*:*:*:*:*:*\",\"matchCriteriaId\":\"12808B52-8F7D-4EE0-A43E-85A1C70A6BE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"81880B84-5E9D-4B7F-B1D5-1BF8D25DAF5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_5_hotfix_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8011D2A7-770B-4AE5-80E6-C762F4F0BB55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"A58603E3-5AFC-4606-8F9E-1B4FF9A9B843\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_6_hotfix_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BED5F42A-5FFF-43E0-9BAD-A5E6C1110551\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABE64339-EF0B-4430-9768-FA7DE82AA61F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF79CA67-765A-4CCB-B1CB-EE1FC02CFCFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_1a:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3E71353-9AFF-4B6D-89BC-A2909A7C5DDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9C5B57E-7852-4E38-9BDA-864CF6F9DB5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2a:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAA2E502-FCBC-404D-8FFA-4601F1D5B747\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2b:*:*:*:*:*:*\",\"matchCriteriaId\":\"650956A6-8DE6-4C16-A77C-2B208B41DF5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_3a:*:*:*:*:*:*\",\"matchCriteriaId\":\"A49AC0E0-9164-43AD-959A-55FCB7965858\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_8:*:*:*:*:*:*\",\"matchCriteriaId\":\"C641B881-7379-448A-A785-3381C72F8353\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"03D48963-936B-4A48-8859-A5066A259E03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9149B850-7196-476A-9A27-DEB85B8C6F19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"10622260-FCBC-4CC0-804E-55D75200FC46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:vancouver:patch_9:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF44F7A1-D153-4723-BA45-0FE4E4725C2F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:washington_dc:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFAC3BF9-2443-4C43-B67A-2BB99297D295\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"444DD275-789F-4C07-9D98-BBFAA1640DB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B29B708-BD7C-4A6C-9E78-37D045101A17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F6EDFA3-9014-4AA7-A17F-DDB1FE96588E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2a:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DA447CA-A6A2-436C-9909-3F0419B7DD6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D18E2CD1-AC8E-4ABF-88DE-D3E61A297ED1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2_hotfix_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"52FC3724-35E5-4C3A-B6BA-3B270EA4255E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6137BB81-6B48-4DCB-A9F6-A27D869C12FC\"}]}]}],\"references\":[{\"url\":\"https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1644293\",\"source\":\"psirt@servicenow.com\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1645154\",\"source\":\"psirt@servicenow.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit\",\"source\":\"psirt@servicenow.com\",\"tags\":[\"Press/Media Coverage\",\"Third Party Advisory\"]},{\"url\":\"https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1644293\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1645154\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Press/Media Coverage\",\"Third Party Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-4879\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1645154\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1644293\", \"tags\": [\"x_login-required\", \"x_transferred\"]}, {\"url\": \"https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T20:55:10.283Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-4879\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-29T18:58:02.257329Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2024-07-29\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-4879\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*\"], \"vendor\": \"servicenow\", \"product\": \"servicenow\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"utah_patch_10_hot_fix_3\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"utah_patch_10a_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_6_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_7_hot_fix_3b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_8_hot_fix_4\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_9\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_10\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_1_hot_fix_2b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_2_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_3_hot_fix_1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_4\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*\"], \"vendor\": \"servicenow\", \"product\": \"servicenow\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"utah_patch_10_hot_fix_3\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"utah_patch_10a_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_6_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_7_hot_fix_3b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_8_hot_fix_4\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_9\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_10\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_1_hot_fix_2b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_2_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_3_hot_fix_1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_4\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*\"], \"vendor\": \"servicenow\", \"product\": \"servicenow\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"utah_patch_10_hot_fix_3\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"utah_patch_10a_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_6_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_7_hot_fix_3b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_8_hot_fix_4\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_9\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_10\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_1_hot_fix_2b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_2_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_3_hot_fix_1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_4\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*\"], \"vendor\": \"servicenow\", \"product\": \"servicenow\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"utah_patch_10_hot_fix_3\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"utah_patch_10a_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_6_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_7_hot_fix_3b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_8_hot_fix_4\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_9\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_10\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_1_hot_fix_2b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_2_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_3_hot_fix_1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_4\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*\"], \"vendor\": \"servicenow\", \"product\": \"servicenow\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"utah_patch_10_hot_fix_3\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"utah_patch_10a_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_6_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_7_hot_fix_3b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_8_hot_fix_4\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_9\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_10\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_1_hot_fix_2b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_2_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_3_hot_fix_1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_4\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*\"], \"vendor\": \"servicenow\", \"product\": \"servicenow\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"utah_patch_10_hot_fix_3\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"utah_patch_10a_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_6_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_7_hot_fix_3b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_8_hot_fix_4\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_9\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_10\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_1_hot_fix_2b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_2_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_3_hot_fix_1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_4\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*\"], \"vendor\": \"servicenow\", \"product\": \"servicenow\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"utah_patch_10_hot_fix_3\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"utah_patch_10a_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_6_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_7_hot_fix_3b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_8_hot_fix_4\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_9\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_10\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_1_hot_fix_2b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_2_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_3_hot_fix_1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_4\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*\"], \"vendor\": \"servicenow\", \"product\": \"servicenow\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"utah_patch_10_hot_fix_3\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"utah_patch_10a_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_6_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_7_hot_fix_3b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_8_hot_fix_4\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_9\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_10\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_1_hot_fix_2b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_2_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_3_hot_fix_1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_4\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*\"], \"vendor\": \"servicenow\", \"product\": \"servicenow\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"utah_patch_10_hot_fix_3\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"utah_patch_10a_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_6_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_7_hot_fix_3b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_8_hot_fix_4\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_9\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_10\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_1_hot_fix_2b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_2_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_3_hot_fix_1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_4\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*\"], \"vendor\": \"servicenow\", \"product\": \"servicenow\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"utah_patch_10_hot_fix_3\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"utah_patch_10a_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_6_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_7_hot_fix_3b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_8_hot_fix_4\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_9\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_10\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_1_hot_fix_2b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_2_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_3_hot_fix_1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_4\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*\"], \"vendor\": \"servicenow\", \"product\": \"servicenow\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"utah_patch_10_hot_fix_3\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"utah_patch_10a_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_6_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_7_hot_fix_3b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_8_hot_fix_4\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_9\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"vancouver_patch_10\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_1_hot_fix_2b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_2_hot_fix_2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_3_hot_fix_1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"washington_dc_patch_4\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2024-07-29T00:00:00+00:00\", \"value\": \"CVE-2024-4879 added to CISA KEV\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-11T17:01:32.286Z\"}}], \"cna\": {\"title\": \"Jelly Template Injection Vulnerability in ServiceNow UI Macros\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Adam Kues\"}, {\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Assetnote Attack Surface Management\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 9.3, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"ServiceNow\", \"product\": \"Now Platform\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"Utah Patch 10 Hot Fix 3\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"Utah Patch 10a Hot Fix 2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"Vancouver Patch 6 Hot Fix 2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"Vancouver Patch 7 Hot Fix 3b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"Vancouver Patch 8 Hot Fix 4\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"Vancouver Patch 9\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"Vancouver Patch 10\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"Washington DC Patch 1 Hot Fix 2b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"Washington DC Patch 2 Hot Fix 2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"Washington DC Patch 3 Hot Fix 1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"Washington DC Patch 4\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1645154\"}, {\"url\": \"https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1644293\", \"tags\": [\"x_login-required\"]}, {\"url\": \"https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform.\\u00a0ServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform.\u003c/span\u003e\u0026nbsp;\u003c/span\u003eServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.\u003cdiv\u003e\u003c/div\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-1287\", \"description\": \"CWE-1287 Improper Validation of Specified Type of Input\"}]}], \"providerMetadata\": {\"orgId\": \"303448ea-6ef3-4077-ad29-5c9bf253c375\", \"shortName\": \"SN\", \"dateUpdated\": \"2024-07-29T22:28:49.374Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-4879\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-30T01:36:37.385Z\", \"dateReserved\": \"2024-05-14T17:39:41.655Z\", \"assignerOrgId\": \"303448ea-6ef3-4077-ad29-5c9bf253c375\", \"datePublished\": \"2024-07-10T16:16:39.926Z\", \"assignerShortName\": \"SN\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…