Vulnerability Details : CVE-2023-40702
PingOne MFA Integration Kit contains a vulnerability where the skipMFA action can be configured such that user authentication does not require the second factor authentication from the user's existing registered devices. A threat actor might be able to exploit this vulnerability to authenticate as a target user if they have existing knowledge of the target user’s first-factor credentials.
Products affected by CVE-2023-40702
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2023-40702
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 29 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-40702
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.7
|
HIGH | CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/V... |
N/A
|
N/A
|
Ping Identity Corporation | 2024-07-09 |
CWE ids for CVE-2023-40702
-
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.Assigned by: responsible-disclosure@pingidentity.com (Secondary)
References for CVE-2023-40702
-
https://docs.pingidentity.com/r/en-us/pingfederate-pingone-mfa-ik/bks1657303194394
Release Notes • PingOne MFA Integration Kit • We’re here to help
Jump to