CVE-2023-39231

7.3 HIGH

📋 TL;DR

This vulnerability in PingFederate with PingOne MFA adapter allows attackers who have compromised a user's first-factor credentials (like username/password) to register their own MFA device without needing to authenticate with the victim's existing MFA device. This affects organizations using PingFederate with PingOne MFA adapter for multi-factor authentication.

💻 Affected Systems

Products:
  • PingFederate with PingOne MFA adapter
Versions: Specific versions not provided in references, but vulnerability exists in PingFederate using PingOne MFA adapter
Operating Systems: All platforms running affected PingFederate
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects configurations using PingOne MFA adapter with PingFederate

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover where attacker gains persistent access to victim's account by registering their own MFA device, bypassing all MFA protections.

🟠

Likely Case

Targeted attacks against high-value accounts where attackers have already obtained first-factor credentials through phishing or credential stuffing.

🟢

If Mitigated

Limited impact if strong first-factor authentication controls exist and MFA device registration is monitored.

🌐 Internet-Facing: HIGH - Authentication systems are typically internet-facing and this vulnerability allows MFA bypass.
🏢 Internal Only: MEDIUM - Internal attackers with stolen credentials could exploit this, but typically have less need for MFA bypass.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires first-factor credentials but then simple MFA device registration process

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references

Vendor Advisory: https://docs.pingidentity.com/r/en-us/pingfederate-pingone-mfa-ik/bks1657303194394

Restart Required: Yes

Instructions:

1. Review PingIdentity advisory 2. Apply recommended patch/update 3. Restart PingFederate services 4. Verify MFA device registration now requires existing device authentication

🔧 Temporary Workarounds

Require existing MFA device authentication

all

Configure PingFederate to require authentication from existing registered MFA device before allowing new device pairing

Enable MFA device registration alerts

all

Configure logging and alerts for all MFA device registration events

🧯 If You Can't Patch

  • Implement additional authentication step for MFA device registration
  • Monitor and audit all MFA device registration events for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Test if new MFA device can be registered without authenticating with existing registered device using test credentials

Check Version:

Check PingFederate version via admin console or pingfederate -v command

Verify Fix Applied:

Verify that new MFA device registration now requires authentication from existing registered device

📡 Detection & Monitoring

Log Indicators:

  • MFA device registration events without corresponding existing device authentication
  • Multiple MFA device registrations for single user in short timeframe

Network Indicators:

  • Authentication requests followed immediately by MFA device registration

SIEM Query:

source="pingfederate" AND (event="mfa_device_registered" AND NOT preceding_event="mfa_device_authenticated")

🔗 References

📤 Share & Export