ServiceNow AI Platform Patches Critical RCE Vulnerability CVE-2026-0542


ServiceNow fixed CVE-2026-0542, a critical remote code execution flaw in its AI Platform sandbox. Attackers could run malicious code without authentication over HTTPS. The company deployed patches starting January 6, 2026, to all affected instances.

This vulnerability hit the AI Platform’s web, API, and automation modules. The sandbox meant to isolate untrusted code failed under specific conditions. Enterprises faced risks of system compromise, data theft, or workflow changes. ServiceNow rates it CVSS 9.8 critical.

No evidence shows active attacks at patch time. Still, unauthenticated RCE draws threat actors fast. Organizations must update now to block exploits. Self-hosted users got hotfixes too.

Vulnerability Breakdown

CVE-2026-0542 breaks sandbox limits. Remote access needs no login. Impact spans full platform control.

MetricDetails
CVE IDCVE-2026-0542
TypeRemote Code Execution (RCE)
ComponentAI Platform sandbox (web/API/automation)
Attack VectorNetwork remote, unauthenticated
CVSS Score9.8 (Critical)
ImpactCode exec, data theft, system takeover

ServiceNow’s advisory confirms: “Update immediately to protect instances.” 

Patch Status by Release

Patches rolled out fast across versions. January Patching Program users got them first.

ReleasePatch/HotfixRelease Date
ZurichPatch 4 Hotfix 3bFeb 23, 2026
ZurichPatch 5Jan 12, 2026
YokohamaPatch 10 Hotfix 1bFeb 18, 2026
YokohamaPatch 12Feb 6, 2026
XanaduPatch 11 Hotfix 1aFeb 2, 2026
AustraliaPending FixExpected Q2 2026

Hosted customers received auto-updates. Verify your version matches or exceeds these.

Exploit Risks and Impact

Attackers gain full sandbox escape. They could steal AI training data or alter workflows. No user action needed makes it dangerous. Finance, healthcare, and IT firms use ServiceNow most.

Regular patching programs help. Still gaps exist in older releases. Australia users await Q2 fix.

Mitigation Steps

Secure your setup now:

  • Check instance against patch table.
  • Apply hotfixes via admin console.
  • Enable auto-update for hosted plans.
  • Scan logs for suspicious API calls.
  • Limit AI Platform network access.

Test updates in staging first. Monitor vendor alerts weekly.

FAQ

What is CVE-2026-0542?

Unauthenticated RCE in ServiceNow AI Platform sandbox.

Are there known exploits?

None reported at patch release.

Which versions need updates?

Zurich, Yokohama, Xanadu, and earlier.

How does attack work?

Remote HTTPS access executes code in sandbox.

Where to find official patches?

ServiceNow KB2693566 security advisory.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages