The “Count(er) Strike” vulnerability, discovered by Varonis Threat Labs, is a high-severity data inference vulnerability (CVE-2025-3648) in ServiceNow, a leading SaaS platform widely used for ITSM, HR, finance, and customer service operations. This vulnerability allows attackers with minimal privileges to enumerate and exfiltrate sensitive data by exploiting how ServiceNow renders record counts in response to list queries, even when actual data is protected by ACLs.
The core issue lies in how ServiceNow’s Access Control List (ACL) system handles query responses:
ServiceNow released a patch for this vulnerability in May 2025, and published official CVE documentation on July 8, 2025. Fixes include new access control mechanisms:
It is recommended that the Now Platform users manually review their tables and modify ACLs to make sure they are not overly permissive, and thus vulnerable to this attack.
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn
No related posts found.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
Please enable Strictly Necessary Cookies first so that we can save your preferences!
This website uses the following additional cookies:
(List the cookies that you are using on the website here.)
More information about our Cookie Policy