CVE-2025-3648: CWE-1220: Insufficient Granularity of Access Control in ServiceNow Now Platform
A vulnerability has been identified in the Now Platform that could result in data being inferred without authorization. Under certain conditional access control list (ACL) configurations, this vulnerability could enable unauthenticated and authenticated users to use range query requests to infer instance data that is not intended to be accessible to them. To assist customers in enhancing access controls, ServiceNow has introduced additional access control frameworks in Xanadu and Yokohama, such as Query ACLs, Security Data Filters and Deny-Unless ACLs. Additionally, in May 2025, ServiceNow delivered to customers a security update that is designed to enhance customer ACL configurations. Customers, please review the KB Articles in the References section.
AI Analysis
Technical Summary
CVE-2025-3648 is a high-severity vulnerability (CVSS 8.2) affecting the ServiceNow Now Platform, specifically impacting the Aspen version. The vulnerability stems from insufficient granularity in access control mechanisms, classified under CWE-1220. It allows both unauthenticated and authenticated users to perform range query requests that can infer sensitive instance data without proper authorization. This inference attack exploits conditional Access Control List (ACL) configurations that fail to adequately restrict data visibility. The vulnerability does not require user interaction and can be exploited remotely over the network without authentication, increasing its risk profile. ServiceNow has addressed this issue by introducing enhanced access control frameworks in subsequent platform releases (Xanadu and Yokohama), including Query ACLs, Security Data Filters, and Deny-Unless ACLs, which provide more precise control over data access. Additionally, a security update was released in May 2025 to improve ACL configurations for affected customers. While no known exploits are currently reported in the wild, the potential for unauthorized data inference poses a significant risk to confidentiality within affected ServiceNow instances.
Potential Impact
For European organizations relying on the ServiceNow Now Platform Aspen version, this vulnerability could lead to unauthorized disclosure of sensitive business data, including potentially personal data protected under GDPR. The ability for unauthenticated actors to infer data increases the risk of data breaches, which could result in regulatory penalties, reputational damage, and operational disruptions. Given ServiceNow's widespread adoption in Europe for IT service management, HR, and customer service workflows, exploitation could impact multiple sectors including finance, healthcare, government, and critical infrastructure. The confidentiality breach could expose internal processes, customer information, or strategic data, undermining trust and compliance. Although integrity and availability are not directly affected, the indirect consequences of data leakage could lead to further targeted attacks or social engineering campaigns.
Mitigation Recommendations
European organizations should immediately verify their ServiceNow platform version and upgrade from Aspen to later versions incorporating the enhanced access control frameworks (Xanadu or Yokohama). Where upgrading is not immediately feasible, organizations must review and tighten ACL configurations to prevent unauthorized range queries, leveraging ServiceNow's guidance and knowledge base articles. Implementing Query ACLs, Security Data Filters, and Deny-Unless ACLs is critical to enforce strict data access policies. Additionally, organizations should conduct thorough audits of current ACLs to identify and remediate overly permissive rules. Monitoring and logging of query patterns should be enhanced to detect anomalous range queries indicative of exploitation attempts. Network-level protections such as IP whitelisting and segmentation can reduce exposure. Finally, organizations should engage with ServiceNow support for tailored security updates and best practices to mitigate this vulnerability effectively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2025-3648: CWE-1220: Insufficient Granularity of Access Control in ServiceNow Now Platform
Description
A vulnerability has been identified in the Now Platform that could result in data being inferred without authorization. Under certain conditional access control list (ACL) configurations, this vulnerability could enable unauthenticated and authenticated users to use range query requests to infer instance data that is not intended to be accessible to them. To assist customers in enhancing access controls, ServiceNow has introduced additional access control frameworks in Xanadu and Yokohama, such as Query ACLs, Security Data Filters and Deny-Unless ACLs. Additionally, in May 2025, ServiceNow delivered to customers a security update that is designed to enhance customer ACL configurations. Customers, please review the KB Articles in the References section.
AI-Powered Analysis
Technical Analysis
CVE-2025-3648 is a high-severity vulnerability (CVSS 8.2) affecting the ServiceNow Now Platform, specifically impacting the Aspen version. The vulnerability stems from insufficient granularity in access control mechanisms, classified under CWE-1220. It allows both unauthenticated and authenticated users to perform range query requests that can infer sensitive instance data without proper authorization. This inference attack exploits conditional Access Control List (ACL) configurations that fail to adequately restrict data visibility. The vulnerability does not require user interaction and can be exploited remotely over the network without authentication, increasing its risk profile. ServiceNow has addressed this issue by introducing enhanced access control frameworks in subsequent platform releases (Xanadu and Yokohama), including Query ACLs, Security Data Filters, and Deny-Unless ACLs, which provide more precise control over data access. Additionally, a security update was released in May 2025 to improve ACL configurations for affected customers. While no known exploits are currently reported in the wild, the potential for unauthorized data inference poses a significant risk to confidentiality within affected ServiceNow instances.
Potential Impact
For European organizations relying on the ServiceNow Now Platform Aspen version, this vulnerability could lead to unauthorized disclosure of sensitive business data, including potentially personal data protected under GDPR. The ability for unauthenticated actors to infer data increases the risk of data breaches, which could result in regulatory penalties, reputational damage, and operational disruptions. Given ServiceNow's widespread adoption in Europe for IT service management, HR, and customer service workflows, exploitation could impact multiple sectors including finance, healthcare, government, and critical infrastructure. The confidentiality breach could expose internal processes, customer information, or strategic data, undermining trust and compliance. Although integrity and availability are not directly affected, the indirect consequences of data leakage could lead to further targeted attacks or social engineering campaigns.
Mitigation Recommendations
European organizations should immediately verify their ServiceNow platform version and upgrade from Aspen to later versions incorporating the enhanced access control frameworks (Xanadu or Yokohama). Where upgrading is not immediately feasible, organizations must review and tighten ACL configurations to prevent unauthorized range queries, leveraging ServiceNow's guidance and knowledge base articles. Implementing Query ACLs, Security Data Filters, and Deny-Unless ACLs is critical to enforce strict data access policies. Additionally, organizations should conduct thorough audits of current ACLs to identify and remediate overly permissive rules. Monitoring and logging of query patterns should be enhanced to detect anomalous range queries indicative of exploitation attempts. Network-level protections such as IP whitelisting and segmentation can reduce exposure. Finally, organizations should engage with ServiceNow support for tailored security updates and best practices to mitigate this vulnerability effectively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- SN
- Date Reserved
- 2025-04-15T13:30:21.572Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 686d42bf6f40f0eb72f85c07
Added to database: 7/8/2025, 4:09:35 PM
Last enriched: 8/20/2025, 12:38:04 AM
Last updated: 8/23/2025, 12:35:19 AM
Views: 49
Related Threats
CVE-2025-9358: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-5352: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in lunary-ai lunary-ai/lunary
HighCVE-2025-9357: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-7813: CWE-918 Server-Side Request Forgery (SSRF) in arraytics Eventin – AI Powered Event Manager, Events Calendar, Booking and Tickets Plugin
HighCVE-2025-43764: CWE-1333 Inefficient Regular Expression Complexity in Liferay Portal
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.