Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12420: CWE-250: Execution with Unnecessary Privileges in ServiceNow Now Assist AI Agents

0
Critical
VulnerabilityCVE-2025-12420cvecve-2025-12420cwe-250
Published: Mon Jan 12 2026 (01/12/2026, 21:29:37 UTC)
Source: CVE Database V5
Vendor/Project: ServiceNow
Product: Now Assist AI Agents

Description

A vulnerability has been identified in the ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform the operations that the impersonated user is entitled to perform. ServiceNow has addressed this vulnerability by deploying a relevant security update to  hosted instances in October 2025. Security updates have also been provided to ServiceNow self-hosted customers, partners, and hosted customers with unique configurations. Additionally, the vulnerability is addressed in the listed Store App versions. We recommend that customers promptly apply an appropriate security update or upgrade if they have not already done so.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:42:38 UTC

Technical Analysis

CVE-2025-12420 is a vulnerability classified under CWE-250 (Execution with Unnecessary Privileges) affecting the Now Assist AI Agents component of the ServiceNow AI Platform. This flaw allows an unauthenticated attacker to impersonate any user within the system, thereby gaining the ability to perform all operations that the impersonated user is entitled to execute. The vulnerability stems from improper privilege management within the AI agent's execution context, enabling privilege escalation without authentication or user interaction. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), and no user interaction (UI:N), with high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). The scope is unchanged (S:N), but the vulnerability affects multiple security properties and requires urgent remediation. ServiceNow deployed security updates in October 2025 to hosted instances and provided patches for self-hosted and uniquely configured environments, including updates to Store App versions. Although no exploits have been observed in the wild, the critical nature of this vulnerability and the ease of exploitation make it a significant threat. The vulnerability could lead to unauthorized data access, manipulation, and disruption of IT service management processes, potentially impacting business continuity and sensitive information security.

Potential Impact

For European organizations, this vulnerability poses a severe risk due to the widespread use of ServiceNow for IT service management, workflow automation, and AI-driven assistance. Successful exploitation could lead to unauthorized access to sensitive corporate data, disruption of critical IT operations, and potential compliance violations under GDPR due to unauthorized data exposure. The ability to impersonate any user without authentication means attackers could escalate privileges, access confidential information, alter configurations, or disrupt services. This could impact sectors such as finance, healthcare, government, and critical infrastructure where ServiceNow is commonly deployed. The operational disruption and data breaches could result in financial losses, reputational damage, and regulatory penalties. Given the AI agent’s role in automating tasks, exploitation could also lead to automated propagation of malicious actions within the environment, amplifying the impact.

Mitigation Recommendations

European organizations should immediately verify their ServiceNow Now Assist AI Agents version and apply the October 2025 security updates or later patches provided by ServiceNow. For self-hosted and uniquely configured instances, coordinate with ServiceNow support to ensure all relevant patches are applied. Conduct thorough audits of user impersonation logs and AI agent activity to detect any anomalous behavior indicative of exploitation attempts. Restrict AI agent privileges to the minimum necessary, avoiding execution with elevated or unnecessary privileges. Implement network segmentation and access controls to limit exposure of ServiceNow instances to untrusted networks. Employ multi-factor authentication and monitor for unusual authentication or access patterns, even though this vulnerability does not require authentication. Regularly review and update incident response plans to include scenarios involving AI agent compromise. Engage with ServiceNow’s security advisories and maintain up-to-date threat intelligence to respond promptly to any emerging exploit activity.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SN
Date Reserved
2025-10-28T16:31:46.125Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696569e5da2266e8382bb6d7

Added to database: 1/12/2026, 9:38:45 PM

Last enriched: 1/21/2026, 2:42:38 AM

Last updated: 2/27/2026, 3:58:06 AM

Views: 879

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses