First published: Tue Oct 24 2023(Updated: )
PingFederate using the PingOne MFA adapter allows a new MFA device to be paired without requiring second factor authentication from an existing registered device. A threat actor may be able to exploit this vulnerability to register their own MFA device if they have knowledge of a victim user's first factor credentials.
Credit: responsible-disclosure@pingidentity.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pingidentity Pingone Mfa Integration Kit | =2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this PingFederate vulnerability is CVE-2023-39231.
The title of this vulnerability is 'PingFederate using the PingOne MFA adapter allows a new MFA device to be paired without requiring second factor authentication from an existing registered device'.
The severity of CVE-2023-39231 is high with a severity value of 6.5.
The vulnerability in PingFederate occurs due to the PingOne MFA adapter allowing a new MFA device to be paired without requiring second factor authentication from an existing registered device.
A threat actor can exploit this vulnerability in PingFederate by registering their own MFA device if they have knowledge of a victim user's first factor authentication.
Yes, patches have been released by PingIdentity to address this vulnerability.
You can find more information about CVE-2023-39231 at the following references: [Reference 1](https://docs.pingidentity.com/r/en-us/pingfederate-pingone-mfa-ik/bks1657303194394) and [Reference 2](https://www.pingidentity.com/en/resources/downloads/pingid.html).