Learn about CVE-2023-39930, a first-factor authentication bypass vulnerability in PingFederate with PingID Radius PCV, impacting confidentiality, integrity, and availability.
A first-factor authentication bypass vulnerability exists in the PingFederate with PingID Radius PCV when a MSCHAP authentication request is sent via a maliciously crafted RADIUS client request.
Understanding CVE-2023-39930
This vulnerability impacts the PingFederate with PingID Radius PCV, potentially leading to an authentication bypass.
What is CVE-2023-39930?
CVE-2023-39930 is a first-factor authentication bypass vulnerability in the PingFederate with PingID Radius PCV when a MSCHAP authentication request is sent via a maliciously crafted RADIUS client request.
The Impact of CVE-2023-39930
The vulnerability can result in an authentication bypass, allowing unauthorized access to affected systems and compromising confidentiality, integrity, and availability of data.
Technical Details of CVE-2023-39930
The vulnerability has a CVSS v3.1 base score of 7.5, indicating a high severity issue with significant impact.
Vulnerability Description
The vulnerability allows an attacker to bypass first-factor authentication in PingFederate with PingID Radius PCV, exploiting a flaw in the authentication process.
Affected Systems and Versions
The PingID Radius PCV version 3.0 is affected by this vulnerability, specifically versions earlier than 3.0.3.
Exploitation Mechanism
Exploiting this vulnerability requires the attacker to send a maliciously crafted RADIUS client request with a MSCHAP authentication, triggering the bypass.
Mitigation and Prevention
It is crucial to take immediate steps to mitigate the risk posed by CVE-2023-39930.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Stay informed about security updates from Ping Identity and apply patches promptly to enhance system security.