Vulnerabilites related to pingidentity - radius_pcv
Vulnerability from fkie_nvd
Published
2023-04-25 19:15
Modified
2024-11-21 07:21
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Summary
The PingID RADIUS PCV adapter for PingFederate, which supports RADIUS authentication with PingID MFA, is vulnerable to MFA bypass under certain configurations.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
pingidentity | pingfederate | * | |
pingidentity | pingfederate | * | |
pingidentity | pingid_integration_kit | * | |
pingidentity | radius_pcv | * | |
pingidentity | radius_pcv | 2.10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pingidentity:pingfederate:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F085AB7-29E3-4CC6-88C6-49EF87B1E7E9", "versionEndIncluding": "11.1.5", "versionStartIncluding": "11.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:pingidentity:pingfederate:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F76BB82-2AE0-4330-84E7-BBFFABF030C0", "versionEndIncluding": "11.2.2", "versionStartIncluding": "11.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:pingidentity:pingid_integration_kit:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0D3BE72-98EE-4FE4-BF80-CDD66F495AC1", "versionEndExcluding": "2.24", "vulnerable": true }, { "criteria": "cpe:2.3:a:pingidentity:radius_pcv:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A97675A-6B44-4AB9-AC7A-D67153A0273C", "versionEndExcluding": "3.0.2", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:pingidentity:radius_pcv:2.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "73EC03B9-23AE-4E5C-A7AD-44D10E3997FA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The PingID RADIUS PCV adapter for PingFederate, which supports RADIUS authentication with PingID MFA, is vulnerable to MFA bypass under certain configurations." } ], "id": "CVE-2022-40723", "lastModified": "2024-11-21T07:21:56.260", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "responsible-disclosure@pingidentity.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-25T19:15:10.310", "references": [ { "source": "responsible-disclosure@pingidentity.com", "tags": [ "Release Notes" ], "url": "https://docs.pingidentity.com/r/en-us/pingid/pingid_integration_kit_2_19_rn" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://docs.pingidentity.com/r/en-us/pingid/pingid_integration_kit_2_19_rn" } ], "sourceIdentifier": "responsible-disclosure@pingidentity.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-305" } ], "source": "responsible-disclosure@pingidentity.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2022-40723 (GCVE-0-2022-40723)
Vulnerability from cvelistv5
Published
2023-04-25 00:00
Modified
2025-02-04 14:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-305 - Authentication Bypass by Primary Weakness
Summary
The PingID RADIUS PCV adapter for PingFederate, which supports RADIUS authentication with PingID MFA, is vulnerable to MFA bypass under certain configurations.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Ping Identity | PingID Radius PCV |
Version: 2.10.0 Version: 3.0.0 < 3.0.0* Version: 3.0.2 < |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:21:46.787Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://docs.pingidentity.com/r/en-us/pingid/pingid_integration_kit_2_19_rn" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-40723", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T14:48:50.451839Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-04T14:48:54.313Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "PingID Radius PCV", "vendor": "Ping Identity", "versions": [ { "status": "affected", "version": "2.10.0" }, { "lessThan": "3.0.0*", "status": "affected", "version": "3.0.0", "versionType": "custom" }, { "lessThanOrEqual": "3.0.2", "status": "affected", "version": "3.0.2", "versionType": "custom" } ] }, { "product": "PingID Integration Kit (includes Radius PCV)", "vendor": "Ping Identity", "versions": [ { "lessThan": "2.24", "status": "affected", "version": "2.24", "versionType": "custom" } ] }, { "product": "PingFederate (includes Radius PCV)", "vendor": "Ping Identity", "versions": [ { "lessThan": "11.1.0*", "status": "affected", "version": "11.1.0", "versionType": "custom" }, { "lessThanOrEqual": "11.1.5", "status": "affected", "version": "11.1.5", "versionType": "custom" }, { "lessThan": "11.2.0*", "status": "affected", "version": "11.2.0", "versionType": "custom" }, { "lessThanOrEqual": "11.2.2", "status": "affected", "version": "11.2.2", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The PingID RADIUS PCV adapter for PingFederate, which supports RADIUS authentication with PingID MFA, is vulnerable to MFA bypass under certain configurations." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitCodeMaturity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "remediationLevel": "UNAVAILABLE", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 6.5, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:H/RL:U/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-305", "description": "CWE-305 Authentication Bypass by Primary Weakness", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-25T00:00:00.000Z", "orgId": "5998a2e9-ae88-42cd-b6e0-7564fd979f9e", "shortName": "Ping Identity" }, "references": [ { "url": "https://docs.pingidentity.com/r/en-us/pingid/pingid_integration_kit_2_19_rn" } ], "source": { "advisory": "SECADV035", "defect": [ "PIM-3774" ], "discovery": "INTERNAL" }, "title": "Configuration-based MFA Bypass in PingID RADIUS PCV." } }, "cveMetadata": { "assignerOrgId": "5998a2e9-ae88-42cd-b6e0-7564fd979f9e", "assignerShortName": "Ping Identity", "cveId": "CVE-2022-40723", "datePublished": "2023-04-25T00:00:00.000Z", "dateReserved": "2022-09-14T00:00:00.000Z", "dateUpdated": "2025-02-04T14:48:54.313Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }