What is the vulnerability?A critical input validation vulnerability (CVE-2024–4879) is identified in ServiceNow’s Now platform hosted in Vancouver and Washington DC, exploiting this vulnerability could lead to potential data breaches and unauthorized system access. Threat actors may weaponize proof-of-concept (PoC) exploits which are publicly available. CISA added CVE-2024–4879 to its Known Exploited Vulnerabilities (KEV) Catalog on July 29, 2024.What is the recommended Mitigation?ServiceNow has released updates for the affected instances. CVE-2024-4879 – Jelly Template Injection Vulnerability in ServiceNow UI Macros – SecurityWhat FortiGuard Coverage is available?FortiGuard Labs recommends users to apply the patches released by the vendor immediately to secure their systems.FortiGuard Intrusion Prevention Service (IPS) protection is currently being investigated to defend against exploitation of CVE-2024-4879.The FortiGuard Incident Response team can be engaged to help with any suspected compromise.
More Stories
golang-github-openprinting-ipp-usb-0.9.30-1.fc41
FEDORA-2025-73800111e8 Packages in this update: golang-github-openprinting-ipp-usb-0.9.30-1.fc41 Update description: 0.9.30, rebuild due golang CVE-2025-22870 Read More
nodejs-nodemon-3.1.9-3.fc41
FEDORA-2025-0951177024 Packages in this update: nodejs-nodemon-3.1.9-3.fc41 Update description: Added patch for CVE-2024-4068 (rhbz#2280624) Read More
nodejs-nodemon-3.1.9-3.fc40
FEDORA-2025-9a278a7768 Packages in this update: nodejs-nodemon-3.1.9-3.fc40 Update description: Added patch for CVE-2024-4068 (rhbz#2280624) Read More
nodejs-nodemon-3.1.9-4.fc42
FEDORA-2025-7d7b644265 Packages in this update: nodejs-nodemon-3.1.9-4.fc42 Update description: Added patch for CVE-2024-4068 (rhbz#2280624) Read More
ZDI-25-148: (0Day) Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to...
USN-7354-1: djoser vulnerability
Diego Cebrián discovered that djoser did not properly handle user authentication. An attacker with valid credentials could possibly use this...