Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12420: CWE-250: Execution with Unnecessary Privileges in ServiceNow Now Assist AI Agents

0
Critical
VulnerabilityCVE-2025-12420cvecve-2025-12420cwe-250
Published: Mon Jan 12 2026 (01/12/2026, 21:29:37 UTC)
Source: CVE Database V5
Vendor/Project: ServiceNow
Product: Now Assist AI Agents

Description

A vulnerability has been identified in the ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform the operations that the impersonated user is entitled to perform. ServiceNow has addressed this vulnerability by deploying a relevant security update to  hosted instances in October 2025. Security updates have also been provided to ServiceNow self-hosted customers, partners, and hosted customers with unique configurations. Additionally, the vulnerability is addressed in the listed Store App versions. We recommend that customers promptly apply an appropriate security update or upgrade if they have not already done so.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:05:45 UTC

Technical Analysis

CVE-2025-12420 is a vulnerability identified in the ServiceNow Now Assist AI Agents platform, specifically version 5.0.26. The root cause is execution with unnecessary privileges (CWE-250), which allows an unauthenticated attacker to impersonate any user within the system. This impersonation enables the attacker to perform any operations that the impersonated user is entitled to, effectively bypassing authentication and authorization controls. The vulnerability is remotely exploitable without any user interaction or prior authentication, making it highly dangerous. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N) confirms network attack vector, low complexity, no authentication, and no user interaction required. The impact metrics (VC:H/VI:H/VA:H) indicate high confidentiality, integrity, and availability impacts, meaning attackers can access sensitive data, modify or delete information, and disrupt services. ServiceNow addressed this vulnerability by deploying security updates to hosted instances in October 2025 and providing patches to self-hosted customers and partners. The vulnerability also affects certain Store App versions, which have been updated accordingly. Although no active exploits have been reported, the critical nature of the flaw demands immediate remediation to prevent potential exploitation.

Potential Impact

The vulnerability poses a severe risk to organizations using ServiceNow Now Assist AI Agents, as it allows attackers to impersonate legitimate users without authentication. This can lead to unauthorized access to sensitive corporate data, manipulation or deletion of records, disruption of IT service management workflows, and potential lateral movement within the network. The compromise of privileged accounts could facilitate further attacks, including data exfiltration, ransomware deployment, or sabotage of critical business processes. Given the widespread adoption of ServiceNow in enterprises globally for IT operations, HR, customer service, and security automation, the impact can be extensive, affecting confidentiality, integrity, and availability of critical business functions. The ease of exploitation and lack of required user interaction increase the likelihood of rapid exploitation if unpatched. Additionally, organizations with self-hosted or uniquely configured instances may face delays in patch deployment, increasing exposure time.

Mitigation Recommendations

Organizations should immediately verify their ServiceNow Now Assist AI Agents version and apply the security updates released in October 2025 or later. For hosted ServiceNow customers, confirm that the vendor has applied the patch to the instance. Self-hosted customers and partners must obtain and deploy the provided security updates without delay. Review and restrict permissions and roles within ServiceNow to minimize privilege exposure. Implement network segmentation and monitoring around ServiceNow instances to detect anomalous activity indicative of impersonation attempts. Enable logging and audit trails for user impersonation and administrative actions to facilitate incident detection and response. Consider deploying Web Application Firewalls (WAF) with rules tuned to detect exploitation attempts targeting ServiceNow APIs. Conduct thorough post-patch testing to ensure no regression or configuration issues. Finally, educate security teams about this vulnerability to maintain heightened vigilance until all systems are confirmed patched.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
SN
Date Reserved
2025-10-28T16:31:46.125Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696569e5da2266e8382bb6d7

Added to database: 1/12/2026, 9:38:45 PM

Last enriched: 2/27/2026, 7:05:45 AM

Last updated: 4/13/2026, 9:30:40 AM

Views: 994

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses