Executive Summary
In October 2025, ServiceNow identified and patched a critical vulnerability, CVE-2025-12420, in its AI Platform. Dubbed 'BodySnatcher,' this flaw allowed unauthenticated attackers to impersonate legitimate users, potentially granting unauthorized access to sensitive enterprise data. The vulnerability affected components such as Now Assist AI Agents and the Virtual Agent API, with ServiceNow deploying security updates to hosted instances and providing patches for self-hosted customers. (techradar.com)
This incident underscores the growing security challenges associated with AI-driven platforms. Organizations are urged to promptly apply security updates and review their AI system configurations to mitigate similar risks. (techradar.com)
Why This Matters Now
The 'BodySnatcher' vulnerability highlights the critical need for robust security measures in AI platforms, as such flaws can lead to significant unauthorized access and data breaches. Organizations must prioritize timely patching and continuous monitoring to safeguard against evolving cyber threats.
Attack Path Analysis
An unauthenticated attacker exploited a vulnerability in the ServiceNow AI Platform to impersonate a legitimate user, gaining unauthorized access. This allowed the attacker to escalate privileges within the platform, moving laterally to access sensitive data. The attacker established command and control channels to maintain persistence and exfiltrated confidential information. The impact included unauthorized data access and potential disruption of services.
Kill Chain Progression
Initial Compromise
Description
An unauthenticated attacker exploited CVE-2025-12420 in the ServiceNow AI Platform, allowing them to impersonate legitimate users without authentication.
Related CVEs
CVE-2025-12420
CVSS 9.8A vulnerability in the ServiceNow AI Platform allows unauthenticated users to impersonate other users, potentially granting unauthorized access to perform operations as the impersonated user.
Affected Products:
ServiceNow AI Platform – Affected versions prior to October 2025 update
Exploit Status:
proof of concept
MITRE ATT&CK® Techniques
Techniques identified for SEO/filtering; may be expanded with full STIX/TAXII enrichment later.
Valid Accounts
Valid Accounts: Cloud Accounts
Use Alternate Authentication Material
Use Alternate Authentication Material: Application Access Token
Application Layer Protocol
Application Layer Protocol: Web Protocols
Account Discovery
Account Discovery: Local Account
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Strong Authentication for Users
Control ID: 8.3.1
NYDFS 23 NYCRR 500 – Multi-Factor Authentication
Control ID: 500.12
DORA – ICT Risk Management Framework
Control ID: Article 6
CISA ZTMM 2.0 – Identity Verification and Authentication
Control ID: Identity Pillar
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Information Technology/IT
ServiceNow AI vulnerability exposes critical infrastructure management platforms to admin impersonation attacks, threatening zero trust implementations and encryption capabilities across enterprise networks.
Computer Software/Engineering
AI-driven security vulnerabilities in platforms like ServiceNow demonstrate escalating risks to software development lifecycle, requiring enhanced threat detection and egress security controls.
Sporting Goods
Nike's 1.4TB data breach exemplifies ransomware evolution targeting consumer brands, necessitating improved east-west traffic security and multicloud visibility for retail operations protection.
Financial Services
CEO concerns shifting from ransomware to cyber-fraud highlight banking sector's need for enhanced anomaly detection, secure connectivity, and comprehensive threat response frameworks.
Sources
- This month in security with Tony Anscombe – January 2026 editionhttps://www.welivesecurity.com/en/videos/month-security-tony-anscombe-january-2026-edition/Verified
- NVD - CVE-2025-12420https://nvd.nist.gov/vuln/detail/CVE-2025-12420Verified
- ServiceNow Security Advisory KB2587329https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB2587329Verified
- Data thieves claim they stole 1.4 TB from Nikehttps://www.theregister.com/2026/01/26/data_thieves_claim_nike_data_haul/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have constrained the attacker's ability to exploit vulnerabilities, escalate privileges, move laterally, establish command and control channels, and exfiltrate data within the ServiceNow AI Platform.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The attacker's ability to exploit the vulnerability and impersonate users would likely be constrained, reducing unauthorized access.
Control: Zero Trust Segmentation
Mitigation: The attacker's ability to escalate privileges would likely be constrained, reducing unauthorized access to sensitive areas.
Control: East-West Traffic Security
Mitigation: The attacker's lateral movement would likely be constrained, reducing access to additional sensitive data.
Control: Multicloud Visibility & Control
Mitigation: The attacker's ability to establish command and control channels would likely be constrained, reducing persistent access.
Control: Egress Security & Policy Enforcement
Mitigation: The attacker's data exfiltration efforts would likely be constrained, reducing unauthorized data transfer.
The overall impact of the attack would likely be constrained, reducing potential data breaches and service disruptions.
Impact at a Glance
Affected Business Functions
- Product Design
- Manufacturing Processes
- Supply Chain Management
Estimated downtime: N/A
Estimated loss: N/A
1.4 TB of internal data, including design and manufacturing workflows, potentially exposing proprietary product development and production processes.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to enforce least privilege access and prevent unauthorized lateral movement within the ServiceNow environment.
- • Deploy Egress Security & Policy Enforcement to monitor and control outbound traffic, mitigating data exfiltration risks.
- • Utilize Threat Detection & Anomaly Response systems to identify and respond to unusual activities indicative of command and control communications.
- • Ensure all ServiceNow instances are updated to the latest patched versions to remediate known vulnerabilities like CVE-2025-12420.
- • Conduct regular security assessments and penetration testing to identify and address potential vulnerabilities within the ServiceNow platform.

