CVE-2025-20628
Received Received - Intake
Insufficient Access Control in PingIDM Remote Connector Server Allows Spoofing

Publication date: 2026-04-07

Last updated on: 2026-04-07

Assigner: Ping Identity Corporation

Description
An insufficient granularity of access control vulnerability exists in PingIDM (formerly ForgeRock Identity Management) where administrators cannot properly configure access rules for Remote Connector Servers (RCS) running in client mode. This means attackers can spoof a client-mode RCS (if one exists) to intercept and/or modify an identity’s security-relevant properties, such as passwords and account recovery information. This issue is exploitable only when an RCS is configured to run in client mode.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-07
Last Modified
2026-04-07
Generated
2026-05-07
AI Q&A
2026-04-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
pingidentity pingidm *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1220 The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an insufficient granularity of access control issue in PingIDM (formerly ForgeRock Identity Management). It occurs because administrators cannot properly configure access rules for Remote Connector Servers (RCS) when they are running in client mode.

As a result, attackers can spoof a client-mode RCS to intercept or modify sensitive identity security properties such as passwords and account recovery information.

This vulnerability is exploitable only if an RCS is configured to run in client mode.


How can this vulnerability impact me? :

This vulnerability can allow attackers to impersonate a Remote Connector Server running in client mode, enabling them to intercept or alter critical security-related identity information.

Such unauthorized access and modification could lead to compromised passwords and account recovery data, potentially resulting in unauthorized account access and identity theft.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in PingIDM allows attackers to spoof a client-mode Remote Connector Server to intercept or modify security-relevant identity properties such as passwords and account recovery information. This insufficient granularity of access control could lead to unauthorized access or data breaches involving sensitive personal information.

Such unauthorized access and potential data compromise may negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require strict protection of personal and sensitive data. Failure to properly secure identity management systems could result in violations of these regulations, leading to legal and financial consequences.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart