Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-41993 : Security Advisory and Response

Discover the impact of CVE-2021-41993 on PingID Android App versions prior to 1.19. Learn about the vulnerability, affected systems, exploitation risks, and mitigation steps.

PingID Android mobile application prior to version 1.19 is vulnerable to pre-computed dictionary attacks, potentially leading to an offline MFA bypass when using PingID Windows Login.

Understanding CVE-2021-41993

A misconfiguration of RSA in the PingID Android app makes it susceptible to offline MFA bypass attacks.

What is CVE-2021-41993?

The CVE-2021-41993 vulnerability allows threat actors to potentially bypass Multi-Factor Authentication (MFA) protections by leveraging pre-computed dictionary attacks on PingID Android app versions earlier than 1.19.

The Impact of CVE-2021-41993

        CVSS Base Score: 6.6 (Medium Severity)
        Confidentiality Impact: High
        Integrity Impact: High
        Privileges Required: High
        Scope: Changed
        Attack Complexity: High
        Attack Vector: Physical
        This vulnerability poses a significant risk to the confidentiality and integrity of user data.

Technical Details of CVE-2021-41993

PingID Android app version prior to 1.19 is impacted by a specific configuration issue.

Vulnerability Description

        The misconfiguration of RSA in the application is the root cause of the vulnerability.

Affected Systems and Versions

        Affected Platform: Android
        Affected Product: PingID Mobile Application
        Vendor: Ping Identity
        Vulnerable Versions: Less than 1.19 (specifically version unspecified, type: custom)

Exploitation Mechanism

        Threat actors can exploit this vulnerability through pre-computed dictionary attacks, targeting users of the PingID Android app with versions older than 1.19.

Mitigation and Prevention

It is crucial to take immediate steps to address and prevent exploitation of CVE-2021-41993.

Immediate Steps to Take

        Users should update the PingID Mobile Application to version 1.19 or newer to mitigate this vulnerability.
        Implement strong password policies and additional layers of security.

Long-Term Security Practices

        Regularly monitor for any unusual login activities.
        Conduct security awareness training to educate users about the risks of MFA bypass attacks.

Patching and Updates

        Ping Identity typically releases security patches and updates to address such vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now