Home

Description

PingOne MFA Integration Kit contains a vulnerability related to the Prompt Users to Set Up MFA configuration. Under certain conditions, this configuration could allow for a new MFA device to be paired with a target user account without requiring second-factor authentication from the target’s existing registered devices. A threat actor might be able to exploit this vulnerability to register their own MFA device with a target user’s account if they have existing knowledge of the target user’s first factor credential.

PUBLISHED Reserved 2023-08-25 | Published 2024-07-09 | Updated 2024-08-02 | Assigner Ping Identity




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-290 Authentication Bypass by Spoofing

Product status

Default status
unaffected

Any version before 2.3.1
affected

References

docs.pingidentity.com/...ate-pingone-mfa-ik/bks1657303194394

cve.org (CVE-2023-40356)

nvd.nist.gov (CVE-2023-40356)

Download JSON