pingidentity CVE Vulnerabilities & Metrics

Focus on pingidentity vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About pingidentity Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with pingidentity. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total pingidentity CVEs: 34
Earliest CVE date: 12 Dec 2014, 15:59 UTC
Latest CVE date: 09 Jul 2024, 23:15 UTC

Latest CVE reference: CVE-2024-22477

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 2

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -84.62%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -84.62%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical pingidentity CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.93

Max CVSS: 9.3

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 20
4.0-6.9 11
7.0-8.9 3
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS pingidentity CVEs

These are the five CVEs with the highest CVSS scores for pingidentity, sorted by severity first and recency.

All CVEs for pingidentity

CVE-2024-22477 pingidentity vulnerability CVSS: 0 09 Jul 2024, 23:15 UTC

A cross-site scripting vulnerability exists in the admin console OIDC Policy Management Editor. The impact is contained to admin console users only.

CVE-2024-22377 pingidentity vulnerability CVSS: 0 09 Jul 2024, 23:15 UTC

The deploy directory in PingFederate runtime nodes is reachable to unauthorized users.

CVE-2023-40545 pingidentity vulnerability CVSS: 0 06 Feb 2024, 18:15 UTC

Authentication bypass when an OAuth2 Client is using client_secret_jwt as its authentication method on affected 11.3 versions via specially crafted requests.

CVE-2023-36496 pingidentity vulnerability CVSS: 0 01 Feb 2024, 23:15 UTC

Delegated Admin Privilege virtual attribute provider plugin, when enabled, allows an authenticated user to elevate their permissions in the Directory Server.

CVE-2023-39930 pingidentity vulnerability CVSS: 0 25 Oct 2023, 18:17 UTC

A first-factor authentication bypass vulnerability exists in the PingFederate with PingID Radius PCV when a MSCHAP authentication request is sent via a maliciously crafted RADIUS client request.

CVE-2023-39231 pingidentity vulnerability CVSS: 0 25 Oct 2023, 18:17 UTC

PingFederate using the PingOne MFA adapter allows a new MFA device to be paired without requiring second factor authentication from an existing registered device. A threat actor may be able to exploit this vulnerability to register their own MFA device if they have knowledge of a victim user's first factor credentials.

CVE-2023-39219 pingidentity vulnerability CVSS: 0 25 Oct 2023, 18:17 UTC

PingFederate Administrative Console dependency contains a weakness where console becomes unresponsive with crafted Java class loading enumeration requests

CVE-2023-37283 pingidentity vulnerability CVSS: 0 25 Oct 2023, 18:17 UTC

Under a very specific and highly unrecommended configuration, authentication bypass is possible in the PingFederate Identifier First Adapter

CVE-2023-34085 pingidentity vulnerability CVSS: 0 25 Oct 2023, 18:17 UTC

When an AWS DynamoDB table is used for user attribute storage, it is possible to retrieve the attributes of another user using a maliciously crafted request

CVE-2022-40725 pingidentity vulnerability CVSS: 0 25 Apr 2023, 19:15 UTC

PingID Desktop prior to the latest released version 1.7.4 contains a vulnerability that can be exploited to bypass the maximum PIN attempts permitted before the time-based lockout is activated.

CVE-2022-40724 pingidentity vulnerability CVSS: 0 25 Apr 2023, 19:15 UTC

The PingFederate Local Identity Profiles '/pf/idprofile.ping' endpoint is vulnerable to Cross-Site Request Forgery (CSRF) through crafted GET requests.

CVE-2022-40723 pingidentity vulnerability CVSS: 0 25 Apr 2023, 19:15 UTC

The PingID RADIUS PCV adapter for PingFederate, which supports RADIUS authentication with PingID MFA, is vulnerable to MFA bypass under certain configurations.

CVE-2022-40722 pingidentity vulnerability CVSS: 0 25 Apr 2023, 19:15 UTC

A misconfiguration of RSA padding implemented in the PingID Adapter for PingFederate to support Offline MFA with PingID mobile authenticators is vulnerable to pre-computed dictionary attacks, leading to a bypass of offline MFA.

CVE-2022-23721 pingidentity vulnerability CVSS: 0 25 Apr 2023, 19:15 UTC

PingID integration for Windows login prior to 2.9 does not handle duplicate usernames, which can lead to a username collision when two people with the same username are provisioned onto the same machine at different times.

CVE-2018-25084 pingidentity vulnerability CVSS: 4.0 10 Apr 2023, 18:15 UTC

A vulnerability, which was classified as problematic, has been found in Ping Identity Self-Service Account Manager 1.1.2. Affected by this issue is some unknown functionality of the file src/main/java/com/unboundid/webapp/ssam/SSAMController.java. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.1.3 is able to address this issue. The patch is identified as f64b10d63bb19ca2228b0c2d561a1a6e5a3bf251. It is recommended to upgrade the affected component. VDB-225362 is the identifier assigned to this vulnerability.

CVE-2022-23725 pingidentity vulnerability CVSS: 2.1 30 Jun 2022, 20:15 UTC

PingID Windows Login prior to 2.8 does not properly set permissions on the Windows Registry entries used to store sensitive API keys under some circumstances.

CVE-2022-23720 pingidentity vulnerability CVSS: 4.4 30 Jun 2022, 20:15 UTC

PingID Windows Login prior to 2.8 does not alert or halt operation if it has been provisioned with the full permissions PingID properties file. An IT administrator could mistakenly deploy administrator privileged PingID API credentials, such as those typically used by PingFederate, into PingID Windows Login user endpoints. Using sensitive full permissions properties file outside of a privileged trust boundary leads to an increased risk of exposure or discovery, and an attacker could leverage these credentials to perform administrative actions against PingID APIs or endpoints.

CVE-2022-23719 pingidentity vulnerability CVSS: 6.9 30 Jun 2022, 20:15 UTC

PingID Windows Login prior to 2.8 does not authenticate communication with a local Java service used to capture security key requests. An attacker with the ability to execute code on the target machine maybe able to exploit and spoof the local Java service using multiple attack vectors. A successful attack can lead to code executed as SYSTEM by the PingID Windows Login application, or even a denial of service for offline security key authentication.

CVE-2022-23718 pingidentity vulnerability CVSS: 9.3 30 Jun 2022, 20:15 UTC

PingID Windows Login prior to 2.8 uses known vulnerable components that can lead to remote code execution. An attacker capable of achieving a sophisticated man-in-the-middle position, or to compromise Ping Identity web servers, could deliver malicious code that would be executed as SYSTEM by the PingID Windows Login application.

CVE-2022-23717 pingidentity vulnerability CVSS: 4.9 30 Jun 2022, 20:15 UTC

PingID Windows Login prior to 2.8 is vulnerable to a denial of service condition on local machines when combined with using offline security keys as part of authentication.

CVE-2021-41995 pingidentity vulnerability CVSS: 5.0 30 Jun 2022, 20:15 UTC

A misconfiguration of RSA in PingID Mac Login prior to 1.1 is vulnerable to pre-computed dictionary attacks, leading to an offline MFA bypass.

CVE-2022-23724 pingidentity vulnerability CVSS: 5.5 04 May 2022, 17:15 UTC

Use of static encryption key material allows forging an authentication token to other users within a tenant organization. MFA may be bypassed by redirecting an authentication flow to a target user. To exploit the vulnerability, must have compromised user credentials.

CVE-2022-23723 pingidentity vulnerability CVSS: 5.0 02 May 2022, 22:15 UTC

An MFA bypass vulnerability exists in the PingFederate PingOne MFA Integration Kit when adapter HTML templates are used as part of an authentication flow.

CVE-2022-23722 pingidentity vulnerability CVSS: 3.5 02 May 2022, 22:15 UTC

When a password reset mechanism is configured to use the Authentication API with an Authentication Policy, email One-Time Password, PingID or SMS authentication, an existing user can reset another existing user’s password.

CVE-2021-41994 pingidentity vulnerability CVSS: 1.9 30 Apr 2022, 22:15 UTC

A misconfiguration of RSA in PingID iOS app prior to 1.19 is vulnerable to pre-computed dictionary attacks, leading to an offline MFA bypass when using PingID Windows Login.

CVE-2021-41993 pingidentity vulnerability CVSS: 1.9 30 Apr 2022, 22:15 UTC

A misconfiguration of RSA in PingID Android app prior to 1.19 is vulnerable to pre-computed dictionary attacks, leading to an offline MFA bypass when using PingID Windows Login.

CVE-2021-41992 pingidentity vulnerability CVSS: 1.9 30 Apr 2022, 22:15 UTC

A misconfiguration of RSA in PingID Windows Login prior to 2.7 is vulnerable to pre-computed dictionary attacks, leading to an offline MFA bypass.

CVE-2021-42000 pingidentity vulnerability CVSS: 3.5 10 Feb 2022, 23:15 UTC

When a password reset or password change flow with an authentication policy is configured and the adapter in the reset or change policy supports multiple parallel reset flows, an existing user can reset another existing users password.

CVE-2021-41770 pingidentity vulnerability CVSS: 5.0 07 Oct 2021, 07:15 UTC

Ping Identity PingFederate before 10.3.1 mishandles pre-parsing validation, leading to an XXE attack that can achieve XML file disclosure.

CVE-2021-40329 pingidentity vulnerability CVSS: 7.5 27 Sep 2021, 17:15 UTC

The Authentication API in Ping Identity PingFederate before 10.3 mishandles certain aspects of external password management.

CVE-2021-31923 pingidentity vulnerability CVSS: 5.0 24 Sep 2021, 03:15 UTC

Ping Identity PingAccess before 5.3.3 allows HTTP request smuggling via header manipulation.

CVE-2020-25826 pingidentity vulnerability CVSS: 7.2 23 Sep 2020, 05:15 UTC

PingID Integration for Windows Login before 2.4.2 allows local users to gain privileges by modifying CefSharp.BrowserSubprocess.exe.

CVE-2019-13564 pingidentity vulnerability CVSS: 4.3 11 Jul 2019, 18:15 UTC

XSS exists in Ping Identity Agentless Integration Kit before 1.5.

CVE-2018-1000134 pingidentity vulnerability CVSS: 7.5 16 Mar 2018, 14:29 UTC

UnboundID LDAP SDK version from commit 801111d8b5c732266a5dbd4b3bb0b6c7b94d7afb up to commit 8471904a02438c03965d21367890276bc25fa5a6, where the issue was reported and fixed contains an Incorrect Access Control vulnerability in process function in SimpleBindRequest class doesn't check for empty password when running in synchronous mode. commit with applied fix https://github.com/pingidentity/ldapsdk/commit/8471904a02438c03965d21367890276bc25fa5a6#diff-f6cb23b459be1ec17df1da33760087fd that can result in Ability to impersonate any valid user. This attack appear to be exploitable via Providing valid username and empty password against servers that do not do additional validation as per https://tools.ietf.org/html/rfc4513#section-5.1.1. This vulnerability appears to have been fixed in after commit 8471904a02438c03965d21367890276bc25fa5a6.

CVE-2014-8489 pingidentity vulnerability CVSS: 6.4 12 Dec 2014, 15:59 UTC

Open redirect vulnerability in startSSO.ping in the SP Endpoints in Ping Identity PingFederate 6.10.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the TargetResource parameter.