Show plain JSON{"id": "CVE-2024-5217", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "psirt@servicenow.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}], "cvssMetricV40": [{"type": "Secondary", "source": "psirt@servicenow.com", "cvssData": {"safety": "NOT_DEFINED", "version": "4.0", "recovery": "NOT_DEFINED", "baseScore": 9.2, "automatable": "NOT_DEFINED", "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "exploitMaturity": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", "userInteraction": "NONE", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "privilegesRequired": "NONE", "modifiedAttackVector": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "subsequentSystemIntegrity": "NONE", "vulnerableSystemIntegrity": "HIGH", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "confidentialityRequirements": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "subsequentSystemAvailability": "NONE", "vulnerableSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "NONE", "vulnerableSystemConfidentiality": "HIGH", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED"}}]}, "published": "2024-07-10T17:15:12.373", "references": [{"url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1644293", "tags": ["Permissions Required"], "source": "psirt@servicenow.com"}, {"url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648313", "tags": ["Vendor Advisory"], "source": "psirt@servicenow.com"}, {"url": "https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit", "tags": ["Press/Media Coverage"], "source": "psirt@servicenow.com"}, {"url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1644293", "tags": ["Permissions Required"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648313", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit", "tags": ["Press/Media Coverage"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Secondary", "source": "psirt@servicenow.com", "description": [{"lang": "en", "value": "CWE-184"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-697"}]}], "descriptions": [{"lang": "en", "value": "ServiceNow has addressed an input validation vulnerability that was identified in the Washington DC, Vancouver, and earlier Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform.\u00a0The vulnerability is addressed in the listed patches and hot fixes below, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible."}, {"lang": "es", "value": "ServiceNow ha abordado una vulnerabilidad de validaci\u00f3n de entrada que se identific\u00f3 en las versiones de Washington DC, Vancouver y versiones anteriores de Now Platform. Esta vulnerabilidad podr\u00eda permitir que un usuario no autenticado ejecute c\u00f3digo de forma remota dentro del contexto de Now Platform. La vulnerabilidad se aborda en los parches y correcciones urgentes que se enumeran a continuaci\u00f3n, que se lanzaron durante el ciclo de parches de junio de 2024. Si a\u00fan no lo ha hecho, le recomendamos aplicar los parches de seguridad relevantes para su instancia lo antes posible."}], "lastModified": "2024-11-27T18:56:05.783", "cisaActionDue": "2024-08-19", "cisaExploitAdd": "2024-07-29", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:servicenow:servicenow:utah:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69E0078E-1953-4F4F-9D5A-B1A140C4B310"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:early_availability:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "03FE0B52-C7A6-4632-A09E-BE7AB8610DD7"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB5CA109-5DC1-4952-AC15-69FAC332BCA2"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44506775-0370-4583-9236-6C9F646B6622"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_1a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A76B918-45DB-49A9-B323-5CB6FF8200AA"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_1b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "118B4618-8702-4C38-88EE-B41C2C9DBF31"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92BED123-0FFC-4113-B0B6-A1A8BD69F4CF"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76439FC6-2DD2-4AD4-9EB6-A2FEAC10B205"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10_hotfix_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8097D9B0-9329-4EB7-BB7E-0FF3057D408B"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10_hotfix_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AFEA8D14-D1C8-486B-ABE7-25C9D6B72CE9"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5DA716A2-E697-4BC3-8127-E772E67E1C49"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10a_hotfix_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EEBB1DCE-25AA-4F95-984C-5BB5341A90ED"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE34BA83-3810-4314-9A45-B1A8944C6612"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98E3E0AF-A341-43BB-91C6-75BBDE695280"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20AC3991-0E5B-4164-807F-0E270B1867BE"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44F86BEB-77D0-41AF-816C-F73B2D9601FE"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9C467AA-B1A2-4A2A-8363-623232BCBCA0"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6E189F6-6623-4A0C-8767-A3CC1C12B759"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D6885DD-230B-468B-B936-7512BE80849D"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_3_hotfix_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1476C240-FCB0-43E3-9C79-2264DB6C200A"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_3_hotfix_1b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9783CA53-CDBD-44F0-B2B9-8C49EBE9FCB4"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "481EC1AA-5863-4641-B67F-CD51416ED0EA"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "402D816A-2650-4743-A386-029C0D063C39"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56CBE65E-2D5A-4191-A2F4-8AC76050404F"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05587BC2-574F-42B6-A121-7ACFD0691ED5"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76D69B8D-02EE-4E3D-9F54-E94F6DB09D5B"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC772DD6-2814-4EEF-A524-CC752C277337"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_3b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "996C57B4-E8AC-48F6-BA71-328F714B1BAC"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10B82BE2-BE38-4EA7-85D5-AC28FF4F50BD"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_4b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D66B18D1-486D-4390-9D1E-5348D1C6729A"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0EC8ACE-70CA-44FC-ACA7-0868D620C86D"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D934721-565F-4707-A32A-B7E4BB9D2DD0"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_5_hotfix_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AA97D74-290C-47C7-9976-6EF83950C530"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "122E0C17-B29B-44B9-A37E-745B103AD398"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_6_hotfix_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AADFD5CE-9C9D-46FF-9871-E2BD7B2C8B98"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_6_hotfix_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECE96EED-C729-4A84-B437-79CCE029C391"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8BD49264-D243-4625-828C-AF383D826779"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_7_hotfix_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB29FCEC-3DDB-46EE-A7AA-4728E6B9A1D6"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_7_hotfix_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC4CA2B8-EFD8-4C01-8F9C-E613619062DF"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_7a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F601F74-593A-4566-A763-EF05E5138FA7"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_7b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47D4CC0E-E3F5-49AB-9D92-AC8FFB17A4C0"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A4CD267-D72A-4F09-BE9B-F008B1804AD9"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_8_hotfix_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24D2EBC6-F894-4C1D-A2FF-B49FF4007ED8"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26D23EE3-0F88-47F7-ADCD-B74F81A08D9B"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB793686-954A-49F8-BC35-A95325D61303"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38DDACA8-69A9-4047-AD99-A7DDC320EAD8"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "926C0F6A-0599-4239-B1CE-5D864BBAA315"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9DB67FCA-6127-486F-A866-3D5E63B81C35"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9132AB29-33C1-4825-BAD4-2804C26316B1"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_1_hotfix_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68D99613-53A1-4B09-9A78-F8EFA0CC6B01"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8FCCFB6-DB7E-4DED-A7E0-1C03087754F5"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7ED2051C-FE4F-4C0A-A3BF-E33141DC3250"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_1a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8CFD4017-5B8E-4CAF-B9E5-4A675C11F01A"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40D69E69-DF88-4F8C-A9BD-B642829107E4"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D21A542-15DC-432C-9C60-F7CABE8D4807"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix1a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1596163B-637A-49F9-B01F-C6CC297F7E5B"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B915FDA-9DCB-43B5-8081-F0690996A3EF"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7308FA07-5C6D-41AA-9EE1-EE9BAAB50A1B"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5ED407E7-9595-4B4D-9D53-1A4807BA327C"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1EA5B288-54DB-437E-88C2-05F90FF3C918"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6ED497ED-1588-4CF8-AE83-7CC7BEF8B982"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A74A3197-68F7-4303-A731-B87A8BF3F831"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A08FD0FD-E062-4BEC-BE95-0ED2D106826B"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F6A6F12-4D7A-4FD3-8FD6-C32D797BB810"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "847F9124-F3C6-4C93-9E80-544CB0580C8C"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_2b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12808B52-8F7D-4EE0-A43E-85A1C70A6BE3"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81880B84-5E9D-4B7F-B1D5-1BF8D25DAF5D"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_5_hotfix_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8011D2A7-770B-4AE5-80E6-C762F4F0BB55"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A58603E3-5AFC-4606-8F9E-1B4FF9A9B843"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_6_hotfix_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BED5F42A-5FFF-43E0-9BAD-A5E6C1110551"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ABE64339-EF0B-4430-9768-FA7DE82AA61F"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF79CA67-765A-4CCB-B1CB-EE1FC02CFCFA"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_1a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3E71353-9AFF-4B6D-89BC-A2909A7C5DDF"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9C5B57E-7852-4E38-9BDA-864CF6F9DB5A"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EAA2E502-FCBC-404D-8FFA-4601F1D5B747"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "650956A6-8DE6-4C16-A77C-2B208B41DF5F"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_3a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A49AC0E0-9164-43AD-959A-55FCB7965858"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46277115-1A2B-4526-83E8-1446EB5A1EAB"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_1a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CDFB167-F252-46A6-A5F6-EF9A4F93FC03"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_1b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43DE243B-E90A-4857-A3A6-3A045FE2D75F"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_2a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33689F99-48DD-47C6-AFAC-DC5D10785860"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_2b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F664F1F-5FB2-48B1-93C7-5DF415E673B7"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C641B881-7379-448A-A785-3381C72F8353"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "03D48963-936B-4A48-8859-A5066A259E03"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9149B850-7196-476A-9A27-DEB85B8C6F19"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10622260-FCBC-4CC0-804E-55D75200FC46"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF44F7A1-D153-4723-BA45-0FE4E4725C2F"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FFAC3BF9-2443-4C43-B67A-2BB99297D295"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "444DD275-789F-4C07-9D98-BBFAA1640DB3"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B29B708-BD7C-4A6C-9E78-37D045101A17"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F6EDFA3-9014-4AA7-A17F-DDB1FE96588E"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1DA447CA-A6A2-436C-9909-3F0419B7DD6F"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F263893-6D34-49D6-9407-ED6CB823595E"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D18E2CD1-AC8E-4ABF-88DE-D3E61A297ED1"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2_hotfix_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52FC3724-35E5-4C3A-B6BA-3B270EA4255E"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6137BB81-6B48-4DCB-A9F6-A27D869C12FC"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3_hotfix_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B06EABB5-0327-4816-AC7B-34D021758812"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29DC5FC9-2ACF-4C51-93C4-2D0982BA0CA6"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9CD5A918-9B71-4CFD-A6DB-437D3B647C6A"}], "operator": "OR"}]}], "sourceIdentifier": "psirt@servicenow.com", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "ServiceNow Incomplete List of Disallowed Inputs Vulnerability"}