Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Reference:
Advisory #2024-254
Version:
1.0
Affected software:
ServiceNow Now Platform
Type:
Remote code execution
CVE/CVSS:
CVE-2024-8923
CVSS 9.3 (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)
On 29 October 2024, ServiceNow published an advisory addressing a critical vulnerability in the Now Platform. An unauthenticated user could exploit this vulnerability to execute code remotely.
ServiceNow’s Now Platform is a popular platform, widely used across the globe. Customers of ServiceNow may choose ServiceNow’s cloud offering, which makes these instances attractive targets as they may host sensitive data and are externally accessible.
There is no information as to active exploitation at this time (cut-off date: 30 October 2024).
Exploitation of this vulnerability can have a high impact on confidentiality, integrity and availability.
CVE-2024-8923 is an input validation vulnerability present in the Now Platform releases prior to Xanadu General Availability. Successful exploitation of this vulnerability would enable an unauthenticated user to remotely execute code within the context of the Now Platform.
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority, after thorough testing.
ServiceNow urges customers to implement the newest version as soon as possible. Patches have been released since August 2024 for the following versions:
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via: https://ccb.belgium.be/cert/report-incident.
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.