High-Severity Data Exposure Vulnerability Identified in ServiceNow Platform (Count(er) Strike)
A high-severity vulnerability named "Count(er) Strike" (CVE-2025-3648) has been identified in ServiceNow’s SaaS platform, potentially exposing sensitive data, including personally identifiable information (PII), credentials, financial details, and confidential business information.
‍
Security researchers from Varonis Threat Labs discovered this vulnerability, which exploits the record count UI element in ServiceNow's access control list (ACL) pages. Attackers can use simple enumeration and common query filtering techniques to infer sensitive data stored within ServiceNow tables, even with minimal access privileges or as a self-registered anonymous user.
‍
Specifically, attackers could:
‍
Prior to mitigation, this vulnerability could potentially impact all ServiceNow customers, especially critical due to the ease of exploitation and the minimal access required. Organizations using ServiceNow for IT Service Management (ITSM), Customer Service Management (CSM), Human Resources Service Delivery (HRSD), and other sensitive business functions were particularly vulnerable.
‍
ServiceNow has addressed the vulnerability through patches released in September 2024 and March 2025. Additionally, they have introduced security enhancements:
‍
‍