First published: Tue Apr 25 2023(Updated: )
A misconfiguration of RSA padding implemented in the PingID Adapter for PingFederate to support Offline MFA with PingID mobile authenticators is vulnerable to pre-computed dictionary attacks, leading to a bypass of offline MFA.
Credit: responsible-disclosure@pingidentity.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pingidentity Pingfederate | >=11.1.0<=11.1.5 | |
Pingidentity Pingfederate | >=11.2.0<=11.2.2 | |
Pingidentity Pingid Adapter For Pingfederate | <2.13.2 | |
Pingidentity Pingid Integration Kit | <2.24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this misconfiguration of RSA padding is CVE-2022-40722.
The severity of CVE-2022-40722 is high with a severity value of 5.8.
The software affected by CVE-2022-40722 includes PingFederate (version 11.1.0 to 11.1.5 and version 11.2.0 to 11.2.2), PingID Adapter for PingFederate (version up to 2.13.2), and PingID Integration Kit (version up to 2.24).
CVE-2022-40722 is a misconfiguration of RSA padding implemented in the PingID Adapter for PingFederate to support Offline MFA with PingID mobile authenticators, which is vulnerable to pre-computed dictionary attacks, leading to a bypass of offline MFA.
To fix CVE-2022-40722, it is recommended to update PingFederate, PingID Adapter for PingFederate, and PingID Integration Kit to the latest versions available as per the vendor's documentation.