CVE-2025-20628
Insufficient Access Control in PingIDM Remote Connector Server Allows Spoofing
Publication date: 2026-04-07
Last updated on: 2026-04-07
Assigner: Ping Identity Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| pingidentity | pingidm | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1220 | The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an insufficient granularity of access control issue in PingIDM (formerly ForgeRock Identity Management). It occurs because administrators cannot properly configure access rules for Remote Connector Servers (RCS) when they are running in client mode.
As a result, attackers can spoof a client-mode RCS to intercept or modify sensitive identity security properties such as passwords and account recovery information.
This vulnerability is exploitable only if an RCS is configured to run in client mode.
How can this vulnerability impact me? :
This vulnerability can allow attackers to impersonate a Remote Connector Server running in client mode, enabling them to intercept or alter critical security-related identity information.
Such unauthorized access and modification could lead to compromised passwords and account recovery data, potentially resulting in unauthorized account access and identity theft.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in PingIDM allows attackers to spoof a client-mode Remote Connector Server to intercept or modify security-relevant identity properties such as passwords and account recovery information. This insufficient granularity of access control could lead to unauthorized access or data breaches involving sensitive personal information.
Such unauthorized access and potential data compromise may negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require strict protection of personal and sensitive data. Failure to properly secure identity management systems could result in violations of these regulations, leading to legal and financial consequences.