PingOne MFA Integration Kit contains a vulnerability where the skipMFA action can be configured such that user authentication does not require the second factor authentication from the user's existing registered devices. A threat actor might be able to exploit this vulnerability to authenticate as a target user if they have existing knowledge of the target user’s first-factor credentials.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-45258 PingOne MFA Integration Kit contains a vulnerability where the skipMFA action can be configured such that user authentication does not require the second factor authentication from the user's existing registered devices. A threat actor might be able to exploit this vulnerability to authenticate as a target user if they have existing knowledge of the target user’s first-factor credentials.
Fixes

Solution

No solution given by the vendor.


Workaround

Disable the Allow Users to Skip MFA Setup in your PingOne MFA adapter configuration.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Ping Identity

Published:

Updated: 2024-08-02T18:38:51.083Z

Reserved: 2023-08-25T16:59:38.691Z

Link: CVE-2023-40702

cve-icon Vulnrichment

Updated: 2024-07-12T20:21:27.340Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-09T16:15:03.220

Modified: 2024-11-21T08:19:59.500

Link: CVE-2023-40702

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses