Description
PingOne MFA Integration Kit contains a vulnerability where the skipMFA action can be configured such that user authentication does not require the second factor authentication from the user's existing registered devices. A threat actor might be able to exploit this vulnerability to authenticate as a target user if they have existing knowledge of the target user’s first-factor credentials.
No analysis available yet.
Remediation
Vendor Workaround
Disable the Allow Users to Skip MFA Setup in your PingOne MFA adapter configuration.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-45258 | PingOne MFA Integration Kit contains a vulnerability where the skipMFA action can be configured such that user authentication does not require the second factor authentication from the user's existing registered devices. A threat actor might be able to exploit this vulnerability to authenticate as a target user if they have existing knowledge of the target user’s first-factor credentials. |
References
History
No history.
Status: PUBLISHED
Assigner: Ping Identity
Published:
Updated: 2024-08-02T18:38:51.083Z
Reserved: 2023-08-25T16:59:38.691Z
Link: CVE-2023-40702
Updated: 2024-07-12T20:21:27.340Z
Status : Awaiting Analysis
Published: 2024-07-09T16:15:03.220
Modified: 2024-11-21T08:19:59.500
Link: CVE-2023-40702
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD