Impact
PingIDM, formerly ForgeRock Identity Management, contains an access control weakness that allows an attacker to impersonate a Remote Connector Server (RCS) running in client mode. By spoofing the RCS endpoint, the attacker can intercept or modify an identity’s security-relevant properties, such as passwords and account recovery information. This flaw leads to a loss of confidentiality and integrity for credential data and can result in full account compromise.
Affected Systems
The vulnerability affects Ping Identity’s PingIDM product. Specific version details are not provided in the available information.
Risk and Exploitability
The flaw carries a CVSS score of 6.9, indicating moderate severity, and is not listed in the CISA KEV catalog. Exploitation requires that a Remote Connector Server be configured in client mode and that the attacker can reach the /openicf endpoint. The risk to an organization is elevated if such a client‑mode server is in use, since a spoofed RCS can alter passwords and recovery data without the administrator’s knowledge.
OpenCVE Enrichment