No analysis available yet.
Vendor Solution
Both of the following steps are required to mitigate the issue: * Upgrade to one of the fixed versions listed previously. * Secure the /openicf endpoint using the new access and authentication configuration options (refer to migration dependent features https://docs.pingidentity.com/pingoneaic/latest/product-information/migration-dependent-features.html#current_migration_dependent_features for more details).
Vendor Workaround
Configure a reverse proxy (such as PingGateway) to enforce IP and certificate-based rules to the /openicf endpoint.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 07 Apr 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An insufficient granularity of access control vulnerability exists in PingIDM (formerly ForgeRock Identity Management) where administrators cannot properly configure access rules for Remote Connector Servers (RCS) running in client mode. This means attackers can spoof a client-mode RCS (if one exists) to intercept and/or modify an identity’s security-relevant properties, such as passwords and account recovery information. This issue is exploitable only when an RCS is configured to run in client mode. | |
| Title | Insufficient granularity of access control for Remote Connector Servers in client mode | |
| Weaknesses | CWE-1220 | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: Ping Identity
Published:
Updated: 2026-04-07T22:33:05.356Z
Reserved: 2025-01-13T16:41:43.939Z
Link: CVE-2025-20628
No data.
Status : Received
Published: 2026-04-07T23:16:27.040
Modified: 2026-04-07T23:16:27.040
Link: CVE-2025-20628
No data.
OpenCVE Enrichment
No data.