CVE-2021-41995

7.7 HIGH

📋 TL;DR

CVE-2021-41995 is a vulnerability in PingID Mac Login that allows attackers to bypass multi-factor authentication through pre-computed dictionary attacks against RSA misconfigurations. This affects organizations using PingID Mac Login for macOS authentication prior to version 1.1. Successful exploitation enables unauthorized access to protected systems without valid MFA credentials.

💻 Affected Systems

Products:
  • PingID Mac Login
Versions: All versions prior to 1.1
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects PingID Mac Login integration, not other PingID products or platforms.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete MFA bypass allowing unauthorized access to all protected macOS systems, potentially leading to data exfiltration, privilege escalation, and lateral movement within the network.

🟠

Likely Case

Targeted attackers gain access to specific macOS endpoints, potentially compromising user accounts and accessing sensitive data on vulnerable systems.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though MFA protection is still compromised for affected systems.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires attacker to have captured authentication data and perform offline dictionary attacks against RSA implementation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1 and later

Vendor Advisory: https://docs.pingidentity.com/bundle/pingid/page/hnh1653583508549.html

Restart Required: Yes

Instructions:

1. Download PingID Mac Login version 1.1 or later from official Ping Identity portal. 2. Install the update on all affected macOS systems. 3. Restart systems to ensure changes take effect. 4. Verify successful installation and functionality.

🔧 Temporary Workarounds

Disable PingID Mac Login

macOS

Temporarily disable the vulnerable PingID Mac Login component until patching can be completed.

sudo launchctl unload /Library/LaunchDaemons/com.pingidentity.pingidmaclogin.plist
sudo rm -rf /Library/LaunchDaemons/com.pingidentity.pingidmaclogin.plist

🧯 If You Can't Patch

  • Implement additional network segmentation to isolate vulnerable macOS systems from critical resources.
  • Enable enhanced logging and monitoring for authentication attempts on affected systems to detect potential exploitation.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of PingID Mac Login by examining the application version in /Applications/PingID Mac Login.app or checking system logs for version information.

Check Version:

defaults read /Applications/PingID\ Mac\ Login.app/Contents/Info.plist CFBundleShortVersionString

Verify Fix Applied:

Verify that PingID Mac Login version is 1.1 or higher and that authentication functions correctly with MFA requirements enforced.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful login without proper MFA validation
  • Unusual authentication patterns from unexpected locations or times

Network Indicators:

  • Authentication traffic patterns inconsistent with normal MFA flow
  • Unencrypted or improperly formatted authentication packets

SIEM Query:

source="macos_auth.log" AND (event="authentication_failure" OR event="authentication_success") AND app="PingID Mac Login" | stats count by user, src_ip

🔗 References

📤 Share & Export