Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks

Posted on November 20, 2025November 20, 2025 By CWS

A harmful vulnerability in ServiceNow’s Now Help AI platform permits attackers to execute second-order immediate injection assaults through default agent configuration settings.

The flaw allows unauthorized actions, together with knowledge theft, privilege escalation, and exfiltration of exterior e mail, even with ServiceNow’s built-in immediate injection safety enabled.

The vulnerability stems from three default configurations that, when mixed, create a harmful assault floor. ServiceNow Help brokers are routinely assigned to the identical staff and marked as discoverable by default.

This allows inter-agent communication by the AiA ReAct Engine and Orchestrator parts, which handle data stream and process delegation between brokers.

ServiceNow AI Immediate Injection Assaults

Attackers exploit this by injecting malicious prompts into knowledge fields that different brokers will learn when a secure agent encounters the compromised knowledge.

It may be tricked into recruiting extra highly effective brokers to execute unauthorized duties on behalf of the extremely privileged person who triggered the preliminary interplay.

In proof-of-concept demonstrations, Appomni researchers efficiently carried out Create, Learn, Replace, and Delete (CRUD) operations.

On delicate information and despatched exterior emails containing confidential knowledge, all whereas avoiding current safety protections.

The assault succeeds primarily as a result of brokers execute with the privileges of the person who initiated the interplay, not the person who inserted the malicious immediate.

A low-privileged attacker can due to this fact leverage administrative brokers to bypass entry controls and entry knowledge they might in any other case be unable to succeed in.

Appomni advises organizations utilizing ServiceNow to right away implement these protecting measures: Allow Supervised Execution Mode: Configure highly effective brokers performing CRUD operations or e mail sending to require human approval earlier than executing actions.

Disable Autonomous Overrides: Make sure the sn_aia.The enable_usecase_tool_execution_mode_override system property stays set to false.

Section Agent Groups: Separate brokers into distinct groups primarily based on operate, stopping low-privilege brokers from accessing highly effective ones.

Monitor Agent Habits: Deploy real-time monitoring options to detect suspicious agent interactions and deviations from anticipated workflows.

ServiceNow confirmed that these behaviors align with the supposed performance however up to date the documentation to make clear configuration dangers. Safety groups should prioritize auditing their AI agent deployments instantly to forestall exploitation of those default settings.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Assistants, Attacks, Configurations, Default, Exploit, Hackers, Injection, Launch, Prompt, ServiceNow

Post navigation

Previous Post: Cline AI Coding Agent Vulnerabilities Enables Prompt Injection, Code Execution, and Data Leakage
Next Post: China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors

Related Posts

New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model Cyber Security News
10 Best Cloud Monitoring Tools in 2025 Cyber Security News
Google Sued BadBox 2.0 Malware Botnet Operators That Infects 10 Million+ Devices Cyber Security News
Sophisticated Malware Campaign Targets WordPress and WooCommerce Sites with Obfuscated Skimmers Cyber Security News
Cisco Warns of Identity Services Engine RCE Vulnerability Exploited in the Wild Cyber Security News
15 Best Identity & Access Management Solutions (IAM) in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
  • SolarWinds Patches Three Critical Serv-U Vulnerabilities
  • China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors
  • Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks
  • Cline AI Coding Agent Vulnerabilities Enables Prompt Injection, Code Execution, and Data Leakage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
  • SolarWinds Patches Three Critical Serv-U Vulnerabilities
  • China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors
  • Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks
  • Cline AI Coding Agent Vulnerabilities Enables Prompt Injection, Code Execution, and Data Leakage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News