Vulnerability Description
PingID Windows Login prior to 2.8 uses known vulnerable components that can lead to remote code execution. An attacker capable of achieving a sophisticated man-in-the-middle position, or to compromise Ping Identity web servers, could deliver malicious code that would be executed as SYSTEM by the PingID Windows Login application.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pingidentity | Pingid Integration For Windows Login | < 2.8 |
Related Weaknesses (CWE)
References
- https://docs.pingidentity.com/bundle/pingid/page/zhy1653552428545.htmlRelease NotesVendor Advisory
- https://www.pingidentity.com/en/resources/downloads/pingid.htmlProductVendor Advisory
- https://docs.pingidentity.com/bundle/pingid/page/zhy1653552428545.htmlRelease NotesVendor Advisory
- https://www.pingidentity.com/en/resources/downloads/pingid.htmlProductVendor Advisory
FAQ
What is CVE-2022-23718?
CVE-2022-23718 is a vulnerability with a CVSS score of 7.6 (HIGH). PingID Windows Login prior to 2.8 uses known vulnerable components that can lead to remote code execution. An attacker capable of achieving a sophisticated man-in-the-middle position, or to compromise...
How severe is CVE-2022-23718?
CVE-2022-23718 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-23718?
Check the references section above for vendor advisories and patch information. Affected products include: Pingidentity Pingid Integration For Windows Login.