Vulnerabilites related to Ping Identity - PingID Integration Kit (includes Radius PCV)
CVE-2022-40723 (GCVE-0-2022-40723)
Vulnerability from cvelistv5
Published
2023-04-25 00:00
Modified
2025-02-04 14:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-305 - Authentication Bypass by Primary Weakness
Summary
The PingID RADIUS PCV adapter for PingFederate, which supports RADIUS authentication with PingID MFA, is vulnerable to MFA bypass under certain configurations.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Ping Identity | PingID Radius PCV |
Version: 2.10.0 Version: 3.0.0 < 3.0.0* Version: 3.0.2 < |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:21:46.787Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://docs.pingidentity.com/r/en-us/pingid/pingid_integration_kit_2_19_rn" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-40723", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T14:48:50.451839Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-04T14:48:54.313Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "PingID Radius PCV", "vendor": "Ping Identity", "versions": [ { "status": "affected", "version": "2.10.0" }, { "lessThan": "3.0.0*", "status": "affected", "version": "3.0.0", "versionType": "custom" }, { "lessThanOrEqual": "3.0.2", "status": "affected", "version": "3.0.2", "versionType": "custom" } ] }, { "product": "PingID Integration Kit (includes Radius PCV)", "vendor": "Ping Identity", "versions": [ { "lessThan": "2.24", "status": "affected", "version": "2.24", "versionType": "custom" } ] }, { "product": "PingFederate (includes Radius PCV)", "vendor": "Ping Identity", "versions": [ { "lessThan": "11.1.0*", "status": "affected", "version": "11.1.0", "versionType": "custom" }, { "lessThanOrEqual": "11.1.5", "status": "affected", "version": "11.1.5", "versionType": "custom" }, { "lessThan": "11.2.0*", "status": "affected", "version": "11.2.0", "versionType": "custom" }, { "lessThanOrEqual": "11.2.2", "status": "affected", "version": "11.2.2", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The PingID RADIUS PCV adapter for PingFederate, which supports RADIUS authentication with PingID MFA, is vulnerable to MFA bypass under certain configurations." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitCodeMaturity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "remediationLevel": "UNAVAILABLE", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 6.5, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:H/RL:U/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-305", "description": "CWE-305 Authentication Bypass by Primary Weakness", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-25T00:00:00.000Z", "orgId": "5998a2e9-ae88-42cd-b6e0-7564fd979f9e", "shortName": "Ping Identity" }, "references": [ { "url": "https://docs.pingidentity.com/r/en-us/pingid/pingid_integration_kit_2_19_rn" } ], "source": { "advisory": "SECADV035", "defect": [ "PIM-3774" ], "discovery": "INTERNAL" }, "title": "Configuration-based MFA Bypass in PingID RADIUS PCV." } }, "cveMetadata": { "assignerOrgId": "5998a2e9-ae88-42cd-b6e0-7564fd979f9e", "assignerShortName": "Ping Identity", "cveId": "CVE-2022-40723", "datePublished": "2023-04-25T00:00:00.000Z", "dateReserved": "2022-09-14T00:00:00.000Z", "dateUpdated": "2025-02-04T14:48:54.313Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }