www.adaptive-shield.com Open in urlscan Pro
34.249.200.254  Public Scan

Submitted URL: https://info.adaptive-shield.com/e3t/Ctc/OQ+113/cYqwz04/VX35jw7nhckzW5t3rmK73GRfJW2dmkKk554TkNN3_3-Js3lYMRW8wLKSR6lZ3pnN9l6VQ8JSK...
Effective URL: https://www.adaptive-shield.com/blog/breach-debrief-series-servicenow-data-exposure?utm_medium=email&_hsmi=279972416&_hsenc=p2AN...
Submission: On October 26 via api from ES — Scanned from ES

Form analysis 0 forms found in the DOM

Text Content

By clicking "accept all cookies" you agree to storing cookies on your device to
enhance navigation, analyze site usage and assist in our marketing efforts. This
website uses cookies to ensure you get the best experience. Get more info

Cookies settings
Accept all cookies Decline

request a demo
Platform



PLATFORM

FEATURES AND FUNCTIONALITIES

 * All Features
 * Saas Posture by Domain
 * SaaS Posture by Application
 * SaaS Compliance Frameworks
 * SaaS Security Checks
 * Alerts
 * Remediation
 * User Inventory
 * 3rd Party App Inventory
 * Device Inventory
 * Resource Inventory
 * Activity Monitoring
 * Posture Over Time
 * Role Based Access Control
 * Threat Center

INTEGRATIONS

 * All Supported Applications
 * R&D
 * BI & Analytics
 * Collaboration & Communication
 * HR, Finance & Legal
 * IT & Security
 * Sales & Marketing
 * Unified Endpoint Management Integrations

GET IN TOUCH

 * See a Demo

Download the Solution Brief: SaaS Security Posture Management
Get Solution Brief
Use Cases



USE CASES

CAPABILITIES

 * All Use Cases
 * SaaS Misconfiguration Management
 * Identity & Access Governance
 * SaaS-to-Saas Access and Discovery
 * Device-to-SaaS Risk Management
 * Identity Threat Detection & Response

BY CATEGORY

 * What is SSPM?
 * SSPM vs. CSPM
 * SSPM vs. Manual Checks
 * SSPM vs. CASB

TOP 10 APPS

 * Microsoft 365
 * Google Workspace
 * Salesforce
 * GitHub
 * Okta
 * Zoom
 * Teams
 * Slack
 * ServiceNow
 * Workday

Kickstarting Your SaaS Security Program
Download
Resources



RESOURCES

LIBRARY

 * All Resources
 * Whitepapers & Reports
 * Webinars & Videos
 * Analyst Reports
 * Solution Briefs / Datasheets

BLOG

 * All Blogs
 * SaaS Security
 * Compliance
 * Research
 * Company News
 * Recaps & Spotlights
 * Use Cases
 * Benchmarks for SaaS Apps
 * SaaS in the real world
 * Breach Debrief

The Ultimate SaaS Security Posture Management Checklist 2023
Download
The Ultimate SaaS Security Posture Management Checklist 2023
Download
Partners



PARTNERS

PARTNERS

 * Business Partners
 * Tech Partners
 * Partner Portal

Partners
Partner with Adaptive Shield and become
part of our partner ecosystem
Partner with Us
Company



COMPANY

COMPANY

 * About Us
 * News
 * Events
 * Careers

Company
Learn all about life at Adaptive Shield
Explore Our Opportunities
Sign in
Follow Us

Sign in
request a demo




SERVICENOW DATA EXPOSURE

Adaptive Shield Team

October 25, 2023
share:


Earlier this week, ServiceNow announced on its support site that
misconfigurations within the platform could result in “unintended access” to
sensitive data. For organizations that use ServiceNow, this security exposure is
a critical concern that can result in a major data leakage of sensitive
corporate data.

ServiceNow is a cloud-based platform used for automating IT service management,
IT operations management, and IT business management for customer service, as
well as HR, security operations, and a wide variety of additional domains. This
SaaS application is considered to be one of the top business-critical
applications due to its infrastructural nature, extensibility as a development
platform, and access to confidential and proprietary data throughout the
organization.

Simple List is an interface widget that pulls data that is stored in tables and
uses them in dashboards. The default configuration for Simple List allows the
data in the tables to be accessed remotely by unauthenticated users. These
tables include sensitive data, including content from IT tickets, internal
classified knowledge bases, employee details, and more.    

These misconfigurations have actually been in place since the introduction of
Access Control Lists in 2015. To date, there were no reported incidents as a
result. However, considering the recent publication of the data leakage
research, leaving it unresolved can now expose companies more than ever.


INSIDE THE SERVICENOW MISCONFIGURATIONS

It’s important to point out that this issue was not caused by a vulnerability in
ServiceNow’s code but by a combination of configurations that exist throughout
the platform.

This issue stems from security controls in a ServiceNow Access Control List
(ACL) widget called Simple List, which puts records into easily readable tables.
These tables organize information from multiple sources and have configurations
with a default setting of Public Access. 

Because these tables are the core of ServiceNow, the issue isn’t contained
within a single setting that can be fixed. Potentially, this needs to be
remediated in multiple locations within the application in combination with the
usage of the UI widget, and throughout all tenants. To further complicate the
issue, changing a single setting could break existing workflows connected to the
Simple List tables, causing severe disruption of existing processes.

On the other hand, leaving these tables and applications exposed could have
major security implications now that this issue has received so much
attention.  


REMEDIATION STEPS

We encourage all ServiceNow customers to review the recent guidance published by
ServiceNow in their knowledge base article – General Information | Potential
Public List Widget Misconfiguration.

To summarize, exposure assessment and remediation measures shall include:

 * Review Access Control Lists (ACLs) that either are entirely empty or,
   alternately, contain the role “Public”
 * Review public widgets and set the “Public” flag to false where it is not
   aligned with their use cases
 * Consider using stricter access control measures using built-in controls
   offered by ServiceNow, such as IP Address Access Control or Adaptive
   Authentication
 * Consider installing ServiceNow Explicit Roles Plugin. ServiceNow states that
   the plugin prevents external users from accessing internal data and instances
   using this plugin are not affected by this issue (the plugin ensures that
   every ACL declares at least one role requirement)


AUTOMATE DATA LEAKAGE PREVENTION FOR SERVICENOW

Organizations that use a SaaS Security Posture Management (SSPM) solution are
able to gain visibility into ServiceNow’s configurations and remediate the issue
based on the recommendations. 


Image 1: Adaptive Shield dashboard with the compliance framework: ServiceNow
KB1553688 - Public List Widget Misconfiguration


COMPLIMENTARY ASSESSMENT TO QUANTIFY EXPOSURE

To help organizations secure ServiceNow, Adaptive Shield is offering a free
ServiceNow assessment for this issue. After a quick validation of your org, our
Security research team will send you a report detailing any exposure your
portals may have from this misconfiguration.

Click here to request the complimentary assessment.

‍

ABOUT THE WRITER

Adaptive Shield Team

Businesses today run nearly every facet of their operations using a wide array
of interconnected SaaS apps. Adaptive Shield’s team is here to keep you informed
as well as help you secure your SaaS estate.


SERVICENOW DATA EXPOSURE

Earlier this week, ServiceNow acknowledged a misconfiguration that could expose
sensitive corporate information to the public. In this blog, we analyze the
issue, explaining why this critical application misconfiguration could have
serious consequences for businesses, and offer remediation guidance.
Read more
Adaptive Shield Team
●
June 9, 2021


ENSURING BUSINESS CONTINUITY IN TIMES OF WAR

At Adaptive Shield, our commitment to our team as well as to our customer’s
business continuity are unwavering. This blog aims to shed light on the measures
we are taking to ensure business continuity during these uncertain times.
Read more
Maor Bin
●
June 9, 2021


RIGHT SIZING PERMISSIONS ACROSS THE SAAS STACK

Customizing permission sets that match the needs of employees is not always
easy, but right-sizing permissions across the SaaS stack is crucial in keeping
data protected.
Read more
Arye Zacks
●
December 28, 2022

request a demo
Solution

By Use CaseWhat is SSPMGet in touch
Platform

Sign inFeatures  & FunctionalitiesIntegrations
Resources

LibraryBlog
Partners

Business PartnersTech Partners
Company

AboutNewsEventsCareers
2023 Adaptive Shield All rights reserved
Trust Center ›Privacy Policy ›Terms ›
GDPR Compliant
ISO 27001 Certified
ISO 27701 Certified
SOC 2 Compliant
Cyber GRX