CVE-2021-42001

8.0 HIGH

📋 TL;DR

PingID Desktop versions before 1.7.3 have an encryption library misconfiguration that could allow attackers to bypass multi-factor authentication. This vulnerability enables successful completion of OTP-based MFA challenges without proper credentials. Organizations using PingID Desktop for authentication are affected.

💻 Affected Systems

Products:
  • PingID Desktop
Versions: All versions prior to 1.7.3
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the desktop client application, not server components

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete MFA bypass allowing unauthorized access to protected systems and data

🟠

Likely Case

Targeted attacks against high-value accounts with MFA bypass

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring

🌐 Internet-Facing: MEDIUM - Requires specific conditions and client-side exploitation
🏢 Internal Only: MEDIUM - Internal attackers could exploit if they gain initial access

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires attacker to intercept or manipulate OTP communication

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.3

Vendor Advisory: https://docs.pingidentity.com/bundle/pingid/page/dyt1645545885978.html

Restart Required: Yes

Instructions:

1. Download PingID Desktop 1.7.3 or later from official Ping Identity portal. 2. Uninstall previous version. 3. Install new version. 4. Restart system.

🔧 Temporary Workarounds

Disable PingID Desktop

all

Temporarily disable PingID Desktop and use alternative MFA methods

Network Segmentation

all

Restrict network access to PingID Desktop clients

🧯 If You Can't Patch

  • Implement additional authentication factors beyond OTP
  • Monitor for unusual authentication patterns and failed MFA attempts

🔍 How to Verify

Check if Vulnerable:

Check PingID Desktop version in application settings or About dialog

Check Version:

Not applicable - check via GUI in application settings

Verify Fix Applied:

Verify version is 1.7.3 or higher in application settings

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed MFA attempts followed by successful authentication
  • Unusual OTP validation patterns

Network Indicators:

  • Unusual traffic patterns to/from PingID Desktop clients
  • Suspicious OTP-related network traffic

SIEM Query:

source="pingid" AND (event_type="mfa_bypass" OR auth_result="success" AFTER multiple auth_result="failure")

🔗 References

📤 Share & Export