First published: Wed May 13 2020(Updated: )
Ping Identity PingID SSH before 4.0.14 contains a heap buffer overflow in PingID-enrolled servers. This condition can be potentially exploited into a Remote Code Execution vector on the authenticating endpoint.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pingidentity Pingid Ssh Integration | <4.0.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10654 is a vulnerability in Ping Identity PingID SSH before 4.0.14 that allows for a heap buffer overflow, which can potentially lead to remote code execution.
The severity of CVE-2020-10654 is critical, with a CVSS score of 9.8.
CVE-2020-10654 affects Ping Identity PingID SSH before version 4.0.14, specifically on PingID-enrolled servers, where it can be potentially exploited for remote code execution.
To fix CVE-2020-10654, it is recommended to upgrade to version 4.0.14 or later of Ping Identity PingID SSH.
The references for CVE-2020-10654 are: - [Ping Identity Documentation](https://docs.pingidentity.com/bundle/pingid/page/hmc1587998527490.html) - [Additional Information](https://docs.pingidentity.com/bundle/pingid/page/okt1564020467088.html) - [Ping Identity Website](https://www.pingidentity.com/)