PingOne MFA Integration Kit contains a vulnerability where the skipMFA action can be configured such that user authentication does not require the second factor authentication from the user's existing registered devices. A threat actor might be able to exploit this vulnerability to authenticate as a target user if they have existing knowledge of the target user’s first-factor credentials.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: Ping Identity
Published:
Updated: 2024-08-02T18:38:51.083Z
Reserved: 2023-08-25T16:59:38.691Z
Link: CVE-2023-40702

Updated: 2024-07-12T20:21:27.340Z

Status : Awaiting Analysis
Published: 2024-07-09T16:15:03.220
Modified: 2024-11-21T08:19:59.500
Link: CVE-2023-40702

No data.