A critical security vulnerability has been identified in the ServiceNow AI Platform that could allow unauthenticated attackers to impersonate legitimate users. Assigned a high severity score of 9.3 out of 10 and tracked as CVE-2025-12420, the flaw presents a serious risk of privilege escalation. ServiceNow has acted quickly, deploying fixes across most of its hosted environments to reduce exposure. The issue was disclosed in October 2025 by SaaS security firm AppOmni, with additional credit given to security researcher Aaron Costello for supporting the responsible disclosure. Their findings revealed weaknesses in authentication controls that could be abused to bypass identity verification mechanisms. According to the advisory, the vulnerability stems from insufficient authentication checks, potentially enabling an unauthenticated attacker to impersonate another user and carry out actions permitted under the victim’s privileges. In practical terms, this could allow an external actor to assume the identity of a high-privilege user without needing valid login credentials. Recognizing the severity of the threat, ServiceNow released security updates on October 30, 2025, addressing the vulnerability across the majority of its hosted instances. The company has stated that it is not currently aware of any active exploitation targeting customer environments. However, ServiceNow cautions that public disclosure increases the risk of misuse and urges customers to review the advisory carefully. While most hosted deployments have already been remediated, self-hosted customers and partners must take immediate action. The vulnerability impacts specific ServiceNow Store Applications, and affected users are advised to update to the latest secure versions. Mitigation requires upgrading Now Assist AI Agents (sn_aia) to version 5.1.18 or later, or 5.2.19 or later, and Virtual Agent API (sn_va_as_service) to version 3.15.2 or later, or 4.0.4 or later, to ensure full protection against exploitation.
A threat actor identified as UAC-0184 has been linked to targeted cyber espionage campaigns against Ukrainian military and government organizations. The campaign leverages phishing...
Cybersecurity researchers have identified a widespread malware campaign abusing fake Google Chrome update prompts to infect users with malicious payloads. The attack leverages comp...
Microsoft has introduced a significant security enhancement in its Edge browser after security researchers disclosed that the browser was automatically loading all saved passwords ...