An insufficient granularity of access control vulnerability exists in PingIDM (formerly ForgeRock Identity Management) where administrators cannot properly configure access rules for Remote Connector Servers (RCS) running in client mode. This means attackers can spoof a client-mode RCS (if one exists) to intercept and/or modify an identity’s security-relevant properties, such as passwords and account recovery information. This issue is exploitable only when an RCS is configured to run in client mode.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Apr 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An insufficient granularity of access control vulnerability exists in PingIDM (formerly ForgeRock Identity Management) where administrators cannot properly configure access rules for Remote Connector Servers (RCS) running in client mode. This means attackers can spoof a client-mode RCS (if one exists) to intercept and/or modify an identity’s security-relevant properties, such as passwords and account recovery information. This issue is exploitable only when an RCS is configured to run in client mode. | |
| Title | Insufficient granularity of access control for Remote Connector Servers in client mode | |
| Weaknesses | CWE-1220 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Ping Identity
Published: 2026-04-07T22:33:05.356Z
Updated: 2026-04-07T22:33:05.356Z
Reserved: 2025-01-13T16:41:43.939Z
Link: CVE-2025-20628
No data.
Status : Received
Published: 2026-04-07T23:16:27.040
Modified: 2026-04-07T23:16:27.040
Link: CVE-2025-20628
No data.