PingID Windows Login prior to 2.8 uses known vulnerable components that can lead to remote code execution. An attacker capable of achieving a sophisticated man-in-the-middle position, or to compromise Ping Identity web servers, could deliver malicious code that would be executed as SYSTEM by the PingID Windows Login application.
Weaknesses in this category are related to the A06 category "Vulnerable and Outdated Components" in the OWASP Top Ten 2021.
Link | Tags |
---|---|
https://www.pingidentity.com/en/resources/downloads/pingid.html | product vendor advisory |
https://docs.pingidentity.com/bundle/pingid/page/zhy1653552428545.html | release notes vendor advisory |