First published: Tue Oct 24 2023(Updated: )
A first-factor authentication bypass vulnerability exists in the PingFederate with PingID Radius PCV when a MSCHAP authentication request is sent via a maliciously crafted RADIUS client request.
Credit: responsible-disclosure@pingidentity.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pingidentity Pingid Radius Pcv | >=3.0.0<3.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-39930 is critical, with a severity value of 9.8.
The vulnerability occurs when a maliciously crafted RADIUS client request containing an MSCHAP authentication request is sent.
The PingFederate with PingID Radius PCV software is affected by CVE-2023-39930.
Yes, a fix is available. It is recommended to update to version 3.0.3 of PingFederate with PingID Radius PCV.
You can find more information about CVE-2023-39930 at the following references: [Link 1](https://docs.pingidentity.com/r/en-us/pingid/pingid_integration_kit_2_26_rn), [Link 2](https://www.pingidentity.com/en/resources/downloads/pingfederate.html)