Vulnerability Details : CVE-2023-40356
PingOne MFA Integration Kit contains a vulnerability related to the Prompt Users to Set Up MFA configuration. Under certain conditions, this configuration could allow for a new MFA device to be paired with a target user account without requiring second-factor authentication from the target’s existing registered devices. A threat actor might be able to exploit this vulnerability to register their own MFA device with a target user’s account if they have existing knowledge of the target user’s first factor credential.
Products affected by CVE-2023-40356
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2023-40356
0.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 31 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-40356
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.7
|
HIGH | CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/V... |
N/A
|
N/A
|
Ping Identity Corporation | 2024-07-09 |
CWE ids for CVE-2023-40356
-
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.Assigned by: responsible-disclosure@pingidentity.com (Secondary)
References for CVE-2023-40356
-
https://docs.pingidentity.com/r/en-us/pingfederate-pingone-mfa-ik/bks1657303194394
Release Notes • PingOne MFA Integration Kit • We’re here to help
Jump to