PingID Windows Login prior to 2.8 does not alert or halt operation if it has been provisioned with the full permissions PingID properties file. An IT administrator could mistakenly deploy administrator privileged PingID API credentials, such as those typically used by PingFederate, into PingID Windows Login user endpoints. Using sensitive full permissions properties file outside of a privileged trust boundary leads to an increased risk of exposure or discovery, and an attacker could leverage these credentials to perform administrative actions against PingID APIs or endpoints.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: Ping Identity
Published: 2022-06-30T19:25:41
Updated: 2024-08-03T03:51:45.962Z
Reserved: 2022-01-19T00:00:00
Link: CVE-2022-23720
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-06-30T20:15:08.377
Modified: 2024-11-21T06:49:10.640
Link: CVE-2022-23720
Redhat
No data.