Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs

Posted on July 10, 2025July 10, 2025 By CWS

A high-severity safety flaw has been disclosed in ServiceNow’s platform that, if efficiently exploited, might end in information publicity and exfiltration.
The vulnerability, tracked as CVE-2025-3648 (CVSS rating: 8.2), has been described as a case of information inference in Now Platform by means of conditional entry management record (ACL) guidelines. It has been codenamed Rely(er) Strike.
“A vulnerability has been recognized within the Now Platform that might end in information being inferred with out authorization,” ServiceNow stated in a bulletin. “Underneath sure conditional entry management record (ACL) configurations, this vulnerability might allow unauthenticated and authenticated customers to make use of vary question requests to deduce occasion information that isn’t meant to be accessible to them.”
Cybersecurity firm Varonis, which found and reported the flaw in February 2024, stated it might have been exploited by malicious actors to acquire unauthorized entry to delicate info, together with personally identifiable info (PII) and credentials.
At its core, the shortcoming impacts the document depend UI factor on record pages, which may very well be trivially abused to deduce and expose confidential information from varied tables inside ServiceNow.
“This vulnerability might have probably affected all ServiceNow situations, impacting lots of of tables,” Varonis researcher Neta Armon stated in a Wednesday evaluation.
“Most regarding, this vulnerability was comparatively easy to use and required solely minimal desk entry, comparable to a weak consumer account throughout the occasion or perhaps a self-registered nameless consumer, which might bypass the necessity for privilege elevation and resulted in delicate information publicity.”

Particularly, the corporate discovered that entry to ServiceNow tables, whereas ruled by ACL configurations, may very well be used to glean info, even in eventualities the place entry is denied attributable to a failed “Knowledge Situation” or “Script Situation” — which makes it attainable to conditionally present entry based mostly on an analysis of sure data-related standards or customized logic.
In these instances, customers are displayed a message, stating “Variety of rows faraway from this record by Safety constraints” together with the depend. Nevertheless, when entry to a useful resource is blocked attributable to “Required Roles” or “Safety Attribute Situation,” customers are displayed a clean web page with the message “Safety constraints forestall entry to the requested web page.”
It is price mentioning that the 4 ACL situations are evaluated in a specific order, beginning with roles, adopted by safety attributes, information situation, and lastly, script situation. For a consumer to realize entry to a useful resource, all of those situations should be happy. Any situation that is left empty is taken into account as not having any form of restriction.

The truth that the responses are completely different based mostly on the 4 ACL situations opens a brand new assault pathway {that a} menace actor can exploit to find out which entry situations aren’t happy, after which repeatedly question the database desk to enumerate the specified info utilizing a mix of question parameters and filters. Tables protected solely by a knowledge or script situation are inclined to the inference assault.

“Any consumer in an occasion can exploit this vulnerability, even these with minimal privileges and no assigned roles, so long as they’ve entry to at the least one misconfigured desk,” Armon stated. “This vulnerability applies to any desk within the occasion with at the least one ACL rule the place the primary two situations are both left empty or are overly permissive — a standard state of affairs.”
To make issues worse, a menace actor might broaden the blast radius of the flaw utilizing methods like dot-walking and self-registration to entry further information from referenced tables, create accounts and achieve entry to an occasion with out requiring prior approval from an administrator.
ServiceNow, in response to the findings, has launched new safety mechanisms, comparable to Question ACLs, Safety Knowledge Filters, and Deny-Except ACLs, to counter the chance posed by the information inference blind question assault. Whereas there isn’t a proof that the problem was ever exploited within the wild, all ServiceNow clients are urged to use the required guardrails on delicate tables.
“ServiceNow clients also needs to bear in mind that question vary Question ACLs will quickly be set to default deny, so they need to create exclusions to keep up licensed consumer capability to carry out such actions,” Armon stated.
DLL Hijacking Flaw in Lenovo’s TrackPoint Fast Menu Software program
The event comes as TrustedSec detailed a privilege escalation flaw (CVE-2025-1729) in TrackPoint Fast Menu software program (“TPQMAssistant.exe”) current in Lenovo computer systems that might allow an area attacker to escalate privileges by the use of a DLL hijacking vulnerability.

The flaw has been addressed in model 1.12.54.0 launched on July 8, 2025, following accountable disclosure earlier this January.
“The listing housing ‘TPQMAssistant.exe’ is writable by normal customers, which is already a purple flag,” safety researcher Oddvar Moe stated. “The folder’s permission permits the CREATOR OWNER to jot down information, which means any native consumer can drop information into this location.”

“When the scheduled job (or the binary itself) is triggered, it makes an attempt to load ‘hostfxr.dll’ from its working listing however fails, leading to a NAME NOT FOUND occasion. This tells us the binary is searching for a dependency that does not exist in its personal listing – an ideal alternative for sideloading.”
Consequently, an attacker can place a malicious model of ‘hostfxr.dll’ within the listing “C: ProgramDatalLenovolTPQMAssistant” to hijack management circulation when the binary is launched, ensuing within the execution of arbitrary code.
Microsoft Addresses Kerberos DoS Bug
The findings additionally comply with the general public disclosure of an out-of-bounds learn flaw in Home windows Kerberos’ Netlogon protocol (CVE-2025-47978, CVSS rating: 6.5) that might allow a certified attacker to disclaim service over a community. The vulnerability was addressed by Microsoft as a part of its Patch Tuesday updates for July 2025.
Silverfort, which has assigned the title NOTLogon to CVE-2025-47978, stated it permits any “domain-joined machine with minimal privileges to ship a specially-crafted authentication request that may crash a website controller and trigger a full reboot.”
“This vulnerability doesn’t require elevated privileges — solely normal community entry and a weak machine account are wanted. In typical enterprise environments, any low-privileged consumer can create such accounts by default,” safety researcher Dor Segal stated.

The cybersecurity firm additionally famous that the crash primarily affected Native Safety Authority Subsystem Service (LSASS), a important safety course of in Home windows that is chargeable for implementing safety insurance policies and dealing with consumer authentication. Profitable exploitation of CVE-2025-47978 might subsequently destabilize or disrupt Lively Listing companies.
“With solely a sound machine account and a crafted RPC message, an attacker can remotely crash a website controller – a system chargeable for the core functionalities of Lively Listing, together with authentication, authorization, Group Coverage enforcement, and repair ticket issuance,” Segal stated.

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:ACLs, CVE20253648, Data, Exposure, Flaw, Lead, Misconfigured, ServiceNow

Post navigation

Previous Post: McDonald’s AI Hiring Bot With Password ‘123456’ Leaks Millions of Job-Seekers Data
Next Post: Rhadamanthys Infostealer Leveraging ClickFix Technique to Steal Login Credentials

Related Posts

Have You Turned Off Your Virtual Oven? The Hacker News
TAG-140 Deploys DRAT V2 RAT, Targeting Indian Government, Defense, and Rail Sectors The Hacker News
Enterprise Browsers vs. Secure Browser Extensions The Hacker News
CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center The Hacker News
Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more The Hacker News
MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Understand Digital Certificates
  • How SOCs Triage Incidents in Seconds with Threat Intelligence
  • Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775
  • New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station
  • First AI Ransomware ‘PromptLock’ Uses OpenAI gpt-oss-20b Model for Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Understand Digital Certificates
  • How SOCs Triage Incidents in Seconds with Threat Intelligence
  • Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775
  • New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station
  • First AI Ransomware ‘PromptLock’ Uses OpenAI gpt-oss-20b Model for Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News