Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 320x200 V0.1
Banner Ancharia Desktop 1 1
ServiceNow Under Attack: How an Email Can Open the Doors to Your Business

ServiceNow Under Attack: How an Email Can Open the Doors to Your Business

27 January 2026 07:21

The recent discovery of a vulnerability in ServiceNow’s AI platform has shaken the cybersecurity industry.

This flaw, characterized by an extremely high severity score, allowed unauthenticated attackers to impersonate any corporate user. To launch the attack, all they needed was a simple email address and a predefined static credential within the system.

Once impersonation was achieved, standard protections such as multi-factor authentication and single sign-on were completely bypassed, leaving the door open for malicious operations.

The most alarming aspect is the attackers’ ability to manipulate AI agents to perform actions with administrative privileges. By abusing workflows, they were able to create backdoor accounts and steal sensitive data on a large scale without activating traditional monitoring systems.

This scenario highlights an uncomfortable truth: traditional perimeter defenses are no longer sufficient in the age of autonomous AI.

The mechanism of agent diversion

The core of the problem lies in how identity is managed across the platform’s various components. At ServiceNow, once an identity was initially validated, trust propagated indefinitely across agents and workflows without further checks. Attackers exploited this gap to “remote control” the organization’s artificial intelligence.

Using the Virtual Agent API, cybercriminals could invoke automations designed to streamline business processes, turning them into weaponized tools. An AI agent with excessive permissions could, for example, create new records in arbitrary database tables, assign high-level roles, and reset passwords, all while masquerading as a legitimate administrator.

The risk of lateral movement

The danger doesn’t end within ServiceNow’s confines. Since this platform often serves as a control plane for other enterprise systems, the initial compromise opened the door to lateral movement into related infrastructures. Attackers could move to other critical applications that blindly trust authorizations from ServiceNow.

This vulnerability demonstrated that systemic risk stems not from a single code error, but from a flaw in the design of interactions between agents. AI’s ability to autonomously chain actions amplified bugs that, in traditional contexts, would have had limited impact, transforming them into a complete compromise of the platform.

Towards a new identity security

The incident highlights the need for complete visibility into what AI agents can do and what data they can access. Organizations must implement rigorous authorization controls that go beyond simple initial authentication. Managing non-human identities is becoming the new battleground for cyber defense.

It’s essential for companies to adopt least-privilege security models, even for automated entities. As Silverfort research highlights, the fragmentation of identities across different tools creates blind spots that attackers can exploit with extreme precision.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella. Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.