Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks

Posted on November 20, 2025November 20, 2025 By CWS

A harmful vulnerability in ServiceNow’s Now Help AI platform permits attackers to execute second-order immediate injection assaults through default agent configuration settings.

The flaw allows unauthorized actions, together with knowledge theft, privilege escalation, and exfiltration of exterior e mail, even with ServiceNow’s built-in immediate injection safety enabled.

The vulnerability stems from three default configurations that, when mixed, create a harmful assault floor. ServiceNow Help brokers are routinely assigned to the identical staff and marked as discoverable by default.

This allows inter-agent communication by the AiA ReAct Engine and Orchestrator parts, which handle data stream and process delegation between brokers.

ServiceNow AI Immediate Injection Assaults

Attackers exploit this by injecting malicious prompts into knowledge fields that different brokers will learn when a secure agent encounters the compromised knowledge.

It may be tricked into recruiting extra highly effective brokers to execute unauthorized duties on behalf of the extremely privileged person who triggered the preliminary interplay.

In proof-of-concept demonstrations, Appomni researchers efficiently carried out Create, Learn, Replace, and Delete (CRUD) operations.

On delicate information and despatched exterior emails containing confidential knowledge, all whereas avoiding current safety protections.

The assault succeeds primarily as a result of brokers execute with the privileges of the person who initiated the interplay, not the person who inserted the malicious immediate.

A low-privileged attacker can due to this fact leverage administrative brokers to bypass entry controls and entry knowledge they might in any other case be unable to succeed in.

Appomni advises organizations utilizing ServiceNow to right away implement these protecting measures: Allow Supervised Execution Mode: Configure highly effective brokers performing CRUD operations or e mail sending to require human approval earlier than executing actions.

Disable Autonomous Overrides: Make sure the sn_aia.The enable_usecase_tool_execution_mode_override system property stays set to false.

Section Agent Groups: Separate brokers into distinct groups primarily based on operate, stopping low-privilege brokers from accessing highly effective ones.

Monitor Agent Habits: Deploy real-time monitoring options to detect suspicious agent interactions and deviations from anticipated workflows.

ServiceNow confirmed that these behaviors align with the supposed performance however up to date the documentation to make clear configuration dangers. Safety groups should prioritize auditing their AI agent deployments instantly to forestall exploitation of those default settings.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Assistants, Attacks, Configurations, Default, Exploit, Hackers, Injection, Launch, Prompt, ServiceNow

Post navigation

Previous Post: Cline AI Coding Agent Vulnerabilities Enables Prompt Injection, Code Execution, and Data Leakage
Next Post: China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors

Related Posts

Windows Rust-based Kernel GDI Vulnerability Leads to Crash and Blue Screen of Death Error Cyber Security News
Identity and Access Management Trends Shaping 2025 Cyber Security News
Xerox FreeFlow Vulnerabilities leads to SSRF and RCE Attacks Cyber Security News
Lionishackers Threat Actors Exfiltrating and Selling Corporate Databases on Dark Web Cyber Security News
Google to Add New Layer of Developer Verification to Distribute Apps on Play Store Cyber Security News
Workday Confirms Data Breach – Hackers Accessed Customers Data and Case Information Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
  • SolarWinds Patches Three Critical Serv-U Vulnerabilities
  • China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors
  • Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks
  • Cline AI Coding Agent Vulnerabilities Enables Prompt Injection, Code Execution, and Data Leakage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
  • SolarWinds Patches Three Critical Serv-U Vulnerabilities
  • China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors
  • Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks
  • Cline AI Coding Agent Vulnerabilities Enables Prompt Injection, Code Execution, and Data Leakage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News