9.9

CVE-2022-43684

ServiceNow has released patches and an upgrade that address an Access Control List (ACL) bypass issue in ServiceNow Core functionality.



Additional Details

This issue is present in the following supported ServiceNow releases: 



  *  Quebec prior to Patch 10 Hot Fix 8b
  *  Rome prior to Patch 10 Hot Fix 1
  *  San Diego prior to Patch 7
  *  Tokyo prior to Tokyo Patch 1; and 
  *  Utah prior to Utah General Availability 




If this ACL bypass issue were to be successfully exploited, it potentially could allow an authenticated user to obtain sensitive information from tables missing authorization controls.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ServicenowServicenow Versionquebec Updatepatch_1_hotfix_1
ServicenowServicenow Versionquebec Updatepatch_10
ServicenowServicenow Versionquebec Updatepatch_10_hotfix_3
ServicenowServicenow Versionquebec Updatepatch_10_hotfix_3a
ServicenowServicenow Versionquebec Updatepatch_10_hotfix_3b
ServicenowServicenow Versionquebec Updatepatch_10_hotfix_4
ServicenowServicenow Versionquebec Updatepatch_2
ServicenowServicenow Versionquebec Updatepatch_2_hotfix_1
ServicenowServicenow Versionquebec Updatepatch_2_hotfix_2
ServicenowServicenow Versionquebec Updatepatch_3
ServicenowServicenow Versionquebec Updatepatch_4
ServicenowServicenow Versionquebec Updatepatch_4_hotfix_2
ServicenowServicenow Versionquebec Updatepatch_5
ServicenowServicenow Versionquebec Updatepatch_6
ServicenowServicenow Versionquebec Updatepatch_7
ServicenowServicenow Versionquebec Updatepatch_8
ServicenowServicenow Versionquebec Updatepatch_9
ServicenowServicenow Versionrome Updatepatch_1
ServicenowServicenow Versionrome Updatepatch_1_hotfix_1
ServicenowServicenow Versionrome Updatepatch_1_hotfix_1a
ServicenowServicenow Versionrome Updatepatch_1_hotfix_1b
ServicenowServicenow Versionrome Updatepatch_1_hotfix_2
ServicenowServicenow Versionrome Updatepatch_1_hotfix_3
ServicenowServicenow Versionrome Updatepatch_10
ServicenowServicenow Versionrome Updatepatch_2
ServicenowServicenow Versionrome Updatepatch_2_hotfix_1
ServicenowServicenow Versionrome Updatepatch_2_hotfix_2
ServicenowServicenow Versionrome Updatepatch_3
ServicenowServicenow Versionrome Updatepatch_3_hotfix_1
ServicenowServicenow Versionrome Updatepatch_4
ServicenowServicenow Versionrome Updatepatch_4_hotfix_1
ServicenowServicenow Versionrome Updatepatch_4_hotfix_1a
ServicenowServicenow Versionrome Updatepatch_4_hotfix_1b
ServicenowServicenow Versionrome Updatepatch_5
ServicenowServicenow Versionrome Updatepatch_5_hotfix_1
ServicenowServicenow Versionrome Updatepatch_5_hotfix_2
ServicenowServicenow Versionrome Updatepatch_6
ServicenowServicenow Versionrome Updatepatch_6_hotfix_1
ServicenowServicenow Versionrome Updatepatch_6_hotfix_2
ServicenowServicenow Versionrome Updatepatch_7
ServicenowServicenow Versionrome Updatepatch_7_hotfix_1
ServicenowServicenow Versionrome Updatepatch_7a
ServicenowServicenow Versionrome Updatepatch_7b
ServicenowServicenow Versionrome Updatepatch_8
ServicenowServicenow Versionrome Updatepatch_8_hotfix_1
ServicenowServicenow Versionrome Updatepatch_8_hotfix_2
ServicenowServicenow Versionrome Updatepatch_9
ServicenowServicenow Versionrome Updatepatch_9_hotfix_1
ServicenowServicenow Versionrome Updatepatch_9a
ServicenowServicenow Versionrome Updatepatch_9b
ServicenowServicenow Versionsan_diego Updatepatch_1
ServicenowServicenow Versionsan_diego Updatepatch_1_hotfix_1
ServicenowServicenow Versionsan_diego Updatepatch_1_hotfix_1a
ServicenowServicenow Versionsan_diego Updatepatch_1_hotfix_1b
ServicenowServicenow Versionsan_diego Updatepatch_10_hotfix_1
ServicenowServicenow Versionsan_diego Updatepatch_10_hotfix_1a
ServicenowServicenow Versionsan_diego Updatepatch_10_hotfix_1b
ServicenowServicenow Versionsan_diego Updatepatch_10_hotfix_2
ServicenowServicenow Versionsan_diego Updatepatch_10_hotfix_2b
ServicenowServicenow Versionsan_diego Updatepatch_2
ServicenowServicenow Versionsan_diego Updatepatch_2_hotfix_1
ServicenowServicenow Versionsan_diego Updatepatch_3
ServicenowServicenow Versionsan_diego Updatepatch_3_hotfix_1
ServicenowServicenow Versionsan_diego Updatepatch_3_hotfix_2
ServicenowServicenow Versionsan_diego Updatepatch_3_hotfix_3
ServicenowServicenow Versionsan_diego Updatepatch_3_hotfix_4
ServicenowServicenow Versionsan_diego Updatepatch_4
ServicenowServicenow Versionsan_diego Updatepatch_4a
ServicenowServicenow Versionsan_diego Updatepatch_4b
ServicenowServicenow Versionsan_diego Updatepatch_5
ServicenowServicenow Versionsan_diego Updatepatch_6
ServicenowServicenow Versiontokyo Update-
ServicenowServicenow Versionutah Update-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.2% 0.414
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
psirt@servicenow.com 9.9 3.1 6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

CWE-668 Exposure of Resource to Wrong Sphere

The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.