Lucene search

K
cvelistPing IdentityCVELIST:CVE-2022-23723
HistoryMay 02, 2022 - 10:05 p.m.

CVE-2022-23723 PingFederate PingOneMFA Integration Kit MFA Bypass

2022-05-0222:05:15
CWE-288
Ping Identity
www.cve.org

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N

7.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.6%

An MFA bypass vulnerability exists in the PingFederate PingOne MFA Integration Kit when adapter HTML templates are used as part of an authentication flow.

CNA Affected

[
  {
    "product": "PingFederate PingOne MFA Integration Kit",
    "vendor": "Ping Identity",
    "versions": [
      {
        "status": "affected",
        "version": "1.4"
      },
      {
        "status": "affected",
        "version": "1.4.1"
      },
      {
        "status": "affected",
        "version": "1.5"
      },
      {
        "status": "affected",
        "version": "1.5.1"
      },
      {
        "status": "affected",
        "version": "1.5.2"
      }
    ]
  }
]

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N

7.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.6%

Related for CVELIST:CVE-2022-23723