Learn about CVE-2022-23722 affecting PingFederate versions 9.3.3P16 to 11.0. Find out the impact, technical details, and mitigation steps to prevent unauthorized password resets.
PingFederate Password Reset via Authentication API Mishandling
Understanding CVE-2022-23722
This CVE involves a vulnerability in PingFederate where an existing user can reset another existing user's password by manipulating the password reset mechanism configured with the Authentication API.
What is CVE-2022-23722?
The vulnerability allows unauthorized users to reset the password of another user by exploiting the Authentication API with various authentication methods such as email One-Time Password, PingID, or SMS authentication.
The Impact of CVE-2022-23722
The impact of this vulnerability is severe as it can lead to unauthorized access to user accounts and sensitive information, posing a significant security risk to organizations using affected versions of PingFederate.
Technical Details of CVE-2022-23722
Vulnerability Description
The issue arises when the password reset mechanism in PingFederate is misconfigured to use the Authentication API, enabling one user to reset another user's password.
Affected Systems and Versions
PingFederate versions 9.3.3P16 to 11.0 are affected by this vulnerability, including versions 10.3.4, 10.2.7, 10.1.9, and 10.0.12.
Exploitation Mechanism
Attackers can exploit this vulnerability by leveraging the Authentication API alongside certain authentication methods to bypass security controls and reset passwords of other users.
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ping Identity has released patches to address the vulnerability. Organizations are advised to apply these patches promptly to secure their systems against potential exploits.