An insufficient granularity of access control vulnerability exists in PingIDM (formerly ForgeRock Identity Management) where administrators cannot properly configure access rules for Remote Connector Servers (RCS) running in client mode. This means attackers can spoof a client-mode RCS (if one exists) to intercept and/or modify an identity’s security-relevant properties, such as passwords and account recovery information. This issue is exploitable only when an RCS is configured to run in client mode.
History

Tue, 07 Apr 2026 22:45:00 +0000

Type Values Removed Values Added
Description An insufficient granularity of access control vulnerability exists in PingIDM (formerly ForgeRock Identity Management) where administrators cannot properly configure access rules for Remote Connector Servers (RCS) running in client mode. This means attackers can spoof a client-mode RCS (if one exists) to intercept and/or modify an identity’s security-relevant properties, such as passwords and account recovery information. This issue is exploitable only when an RCS is configured to run in client mode.
Title Insufficient granularity of access control for Remote Connector Servers in client mode
Weaknesses CWE-1220
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/S:P/AU:Y/R:U/V:C/RE:M/U:Red'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Ping Identity

Published: 2026-04-07T22:33:05.356Z

Updated: 2026-04-07T22:33:05.356Z

Reserved: 2025-01-13T16:41:43.939Z

Link: CVE-2025-20628

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-07T23:16:27.040

Modified: 2026-04-07T23:16:27.040

Link: CVE-2025-20628

cve-icon Redhat

No data.