PingID Windows Login prior to 2.8 uses known vulnerable components that can lead to remote code execution. An attacker capable of achieving a sophisticated man-in-the-middle position, or to compromise Ping Identity web servers, could deliver malicious code that would be executed as SYSTEM by the PingID Windows Login application.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-28654 | PingID Windows Login prior to 2.8 uses known vulnerable components that can lead to remote code execution. An attacker capable of achieving a sophisticated man-in-the-middle position, or to compromise Ping Identity web servers, could deliver malicious code that would be executed as SYSTEM by the PingID Windows Login application. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: Ping Identity
Published:
Updated: 2024-08-03T03:51:46.036Z
Reserved: 2022-01-19T00:00:00.000Z
Link: CVE-2022-23718
No data.
Status : Modified
Published: 2022-06-30T20:15:08.253
Modified: 2024-11-21T06:49:10.377
Link: CVE-2022-23718
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD