Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsBodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNow
BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNow
Cybersecurity

BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNow

•January 13, 2026
0
Security Boulevard
Security Boulevard•Jan 13, 2026

Companies Mentioned

ServiceNow

ServiceNow

NOW

AppOmni

AppOmni

Slack

Slack

WORK

Microsoft

Microsoft

MSFT

Why It Matters

The flaw turns ServiceNow’s AI‑driven automation into a remote attack vector, exposing enterprise data and control to unauthenticated actors. Prompt remediation is essential for organizations relying on ServiceNow’s workflow automation.

Key Takeaways

  • •Unauthenticated email allows admin impersonation via Virtual Agent API.
  • •Shared static secret bypasses MFA and SSO controls.
  • •Exploit creates admin user, granting full ServiceNow access.
  • •On‑premise customers must upgrade to fixed versions immediately.
  • •Enforce MFA for provider linking and audit dormant AI agents

Pulse Analysis

The emergence of agentic AI has amplified traditional software bugs, turning routine misconfigurations into high‑impact threats. ServiceNow’s Virtual Agent platform, designed to streamline ticketing and self‑service, relies on a provider model where external channels authenticate via a static client secret. When combined with an auto‑linking feature that trusts a simple email address, the architecture inadvertently creates a backdoor: any actor who knows a target’s email can masquerade as that user, sidestepping multi‑factor authentication and single‑sign‑on mechanisms.

Technical analysis reveals that the shared secret—identical across all ServiceNow instances—feeds the Virtual Agent API endpoint, while the hidden AIA‑Agent Invoker AutoChat topic silently routes requests to privileged AI agents. By crafting a JSON payload that specifies the admin’s email and the internal topic identifiers, an attacker can trigger the AI orchestrator to execute arbitrary commands, such as provisioning a new admin account. The exploit leverages the A2A (Agent‑to‑Agent) scripted REST API to inject context variables, effectively hijacking the AI workflow and granting full platform control without ever authenticating.

Mitigation requires a multi‑layered approach. On‑premise deployments should apply the vendor‑released patches for Now Assist AI Agents (≥ 5.1.18/5.2.19) and Virtual Agent API (≥ 3.15.2/4.0.4). Organizations must enforce MFA on provider account‑linking, disable auto‑linking where possible, and institute rigorous AI‑agent lifecycle policies—regularly auditing dormant agents and requiring steward approval for new agents. As AI assistants become integral to enterprise operations, treating their configuration as critical infrastructure will be essential to prevent similar agentic attack chains across other platforms.

BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNow

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...