First published: Mon May 02 2022(Updated: )
An MFA bypass vulnerability exists in the PingFederate PingOne MFA Integration Kit when adapter HTML templates are used as part of an authentication flow.
Credit: responsible-disclosure@pingidentity.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pingidentity Pingone Mfa Integration Kit | =1.4 | |
Pingidentity Pingone Mfa Integration Kit | =1.4.1 | |
Pingidentity Pingone Mfa Integration Kit | =1.5 | |
Pingidentity Pingone Mfa Integration Kit | =1.5.1 | |
Pingidentity Pingone Mfa Integration Kit | =1.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23723 is an MFA bypass vulnerability in the PingFederate PingOne MFA Integration Kit when adapter HTML templates are used as part of an authentication flow.
The PingFederate PingOne MFA Integration Kit versions 1.4, 1.4.1, 1.5, 1.5.1, and 1.5.2 are affected by CVE-2022-23723.
CVE-2022-23723 has a severity rating of 7.7 (High).
To fix CVE-2022-23723, update to a patched version of the PingFederate PingOne MFA Integration Kit.
You can find more information about CVE-2022-23723 in the official documentation: [link](https://docs.pingidentity.com/bundle/pingfederate-pingone-mfa-ik/page/wpt1599064234202.html) and [link](https://www.pingidentity.com/en/resources/downloads/pingfederate.html).