9.8
CVE-2023-39930
- EPSS 0.04%
- Veröffentlicht 25.10.2023 18:17:29
- Zuletzt bearbeitet 21.11.2024 08:16:03
- Quelle responsible-disclosure@pingide
- CVE-Watchlists
- Unerledigt
A first-factor authentication bypass vulnerability exists in the PingFederate with PingID Radius PCV when a MSCHAP authentication request is sent via a maliciously crafted RADIUS client request.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Pingidentity ≫ Pingid Radius Pcv Version >= 3.0.0 < 3.0.3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.128 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| responsible-disclosure@pingidentity.com | 7.5 | 1.6 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
|
CWE-288 Authentication Bypass Using an Alternate Path or Channel
The product requires authentication, but the product has an alternate path or channel that does not require authentication.
CWE-306 Missing Authentication for Critical Function
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.