10

CVE-2024-8923

ServiceNow has addressed an input validation vulnerability that was identified in the Now Platform. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. ServiceNow deployed an update to hosted instances and ServiceNow provided the update to our partners and self-hosted customers. Further, the vulnerability is addressed in the listed patches and hot fixes.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ServicenowServicenow Versionxanadu Updateearly_availability
ServicenowServicenow Versionxanadu Updateearly_availability_hotfix_1
ServicenowServicenow Versionwashington_dc Update-
ServicenowServicenow Versionwashington_dc Updateearly_availability
ServicenowServicenow Versionwashington_dc Updateearly_availability_hotfix_1
ServicenowServicenow Versionwashington_dc Updatepatch_1
ServicenowServicenow Versionwashington_dc Updatepatch_1_hotfix_1
ServicenowServicenow Versionwashington_dc Updatepatch_1_hotfix_2
ServicenowServicenow Versionwashington_dc Updatepatch_1_hotfix_2a
ServicenowServicenow Versionwashington_dc Updatepatch_1_hotfix_2b
ServicenowServicenow Versionwashington_dc Updatepatch_1_hotfix_3b
ServicenowServicenow Versionwashington_dc Updatepatch_2
ServicenowServicenow Versionwashington_dc Updatepatch_2_hotfix_1
ServicenowServicenow Versionwashington_dc Updatepatch_2_hotfix_2
ServicenowServicenow Versionwashington_dc Updatepatch_3
ServicenowServicenow Versionwashington_dc Updatepatch_3_hotfix_1
ServicenowServicenow Versionwashington_dc Updatepatch_3_hotfix_2
ServicenowServicenow Versionwashington_dc Updatepatch_3_hotfix_3
ServicenowServicenow Versionwashington_dc Updatepatch_4
ServicenowServicenow Versionwashington_dc Updatepatch_4_hotfix_1
ServicenowServicenow Versionvancouver Update-
ServicenowServicenow Versionvancouver Updateearly_availability
ServicenowServicenow Versionvancouver Updateearly_availability_hotfix_1
ServicenowServicenow Versionvancouver Updateearly_availability_hotfix_2
ServicenowServicenow Versionvancouver Updatepatch_1
ServicenowServicenow Versionvancouver Updatepatch_1_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_2
ServicenowServicenow Versionvancouver Updatepatch_2_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_2_hotfix_1a
ServicenowServicenow Versionvancouver Updatepatch_2_hotfix_2
ServicenowServicenow Versionvancouver Updatepatch_2_hotfix_3
ServicenowServicenow Versionvancouver Updatepatch_2_hotfix1a
ServicenowServicenow Versionvancouver Updatepatch_3
ServicenowServicenow Versionvancouver Updatepatch_3_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_3_hotfix_2
ServicenowServicenow Versionvancouver Updatepatch_3_hotfix_3
ServicenowServicenow Versionvancouver Updatepatch_3_hotfix_4
ServicenowServicenow Versionvancouver Updatepatch_4
ServicenowServicenow Versionvancouver Updatepatch_4_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_4_hotfix_1a
ServicenowServicenow Versionvancouver Updatepatch_4_hotfix_1b
ServicenowServicenow Versionvancouver Updatepatch_4_hotfix_2b
ServicenowServicenow Versionvancouver Updatepatch_5
ServicenowServicenow Versionvancouver Updatepatch_5_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_6
ServicenowServicenow Versionvancouver Updatepatch_6_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_6_hotfix_2
ServicenowServicenow Versionvancouver Updatepatch_7
ServicenowServicenow Versionvancouver Updatepatch_7_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_7_hotfix_1a
ServicenowServicenow Versionvancouver Updatepatch_7_hotfix_2
ServicenowServicenow Versionvancouver Updatepatch_7_hotfix_2a
ServicenowServicenow Versionvancouver Updatepatch_7_hotfix_2b
ServicenowServicenow Versionvancouver Updatepatch_7_hotfix_3a
ServicenowServicenow Versionvancouver Updatepatch_7_hotfix_3b
ServicenowServicenow Versionvancouver Updatepatch_7_hotfix_4
ServicenowServicenow Versionvancouver Updatepatch_7_hotifix_1a
ServicenowServicenow Versionvancouver Updatepatch_7_hotifix_1b
ServicenowServicenow Versionvancouver Updatepatch_7_hotifix_2a
ServicenowServicenow Versionvancouver Updatepatch_7_hotifix_2b
ServicenowServicenow Versionvancouver Updatepatch_8
ServicenowServicenow Versionvancouver Updatepatch_8_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_8_hotfix_2
ServicenowServicenow Versionvancouver Updatepatch_8_hotfix_3
ServicenowServicenow Versionvancouver Updatepatch_8_hotfix_4
ServicenowServicenow Versionvancouver Updatepatch_8_hotfix_5
ServicenowServicenow Versionvancouver Updatepatch_9
ServicenowServicenow Versionvancouver Updatepatch_9_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_9_hotfix_2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.83% 0.739
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 10 3.9 6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
psirt@servicenow.com 9.3 0 0
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
psirt@servicenow.com 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.