First published: Thu Jun 30 2022(Updated: )
PingID Windows Login prior to 2.8 does not authenticate communication with a local Java service used to capture security key requests. An attacker with the ability to execute code on the target machine maybe able to exploit and spoof the local Java service using multiple attack vectors. A successful attack can lead to code executed as SYSTEM by the PingID Windows Login application, or even a denial of service for offline security key authentication.
Credit: responsible-disclosure@pingidentity.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pingidentity Pingid Integration For Windows Login | <2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security issue is CVE-2022-23719.
The severity of CVE-2022-23719 is high with a severity value of 6.4.
The affected software for CVE-2022-23719 is Pingidentity Pingid Integration For Windows Login prior to version 2.8.
CVE-2022-23719 affects the communication with a local Java service used to capture security key requests by not authenticating it, allowing an attacker to exploit and spoof the service.
Yes, you can find more information about CVE-2022-23719 in the PingIdentity documentation and downloads page.