First published: Thu Jun 30 2022(Updated: )
PingID Windows Login prior to 2.8 does not alert or halt operation if it has been provisioned with the full permissions PingID properties file. An IT administrator could mistakenly deploy administrator privileged PingID API credentials, such as those typically used by PingFederate, into PingID Windows Login user endpoints. Using sensitive full permissions properties file outside of a privileged trust boundary leads to an increased risk of exposure or discovery, and an attacker could leverage these credentials to perform administrative actions against PingID APIs or endpoints.
Credit: responsible-disclosure@pingidentity.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pingidentity Pingid Integration For Windows Login | <2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-23720.
The severity of CVE-2022-23720 is high.
CVE-2022-23720 affects PingID Windows Login prior to version 2.8.
The impact of CVE-2022-23720 is that PingID Windows Login does not alert or halt operation if it has been provisioned with the full permissions PingID properties file.
To fix CVE-2022-23720, upgrade PingID Windows Login to version 2.8 or higher.