PingOne MFA Integration Kit contains a vulnerability where the skipMFA action can be configured such that user authentication does not require the second factor authentication from the user's existing registered devices. A threat actor might be able to exploit this vulnerability to authenticate as a target user if they have existing knowledge of the target user’s first-factor credentials.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-45258 | PingOne MFA Integration Kit contains a vulnerability where the skipMFA action can be configured such that user authentication does not require the second factor authentication from the user's existing registered devices. A threat actor might be able to exploit this vulnerability to authenticate as a target user if they have existing knowledge of the target user’s first-factor credentials. |
Fixes
Solution
No solution given by the vendor.
Workaround
Disable the Allow Users to Skip MFA Setup in your PingOne MFA adapter configuration.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Ping Identity
Published:
Updated: 2024-08-02T18:38:51.083Z
Reserved: 2023-08-25T16:59:38.691Z
Link: CVE-2023-40702
Updated: 2024-07-12T20:21:27.340Z
Status : Awaiting Analysis
Published: 2024-07-09T16:15:03.220
Modified: 2024-11-21T08:19:59.500
Link: CVE-2023-40702
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD