
Cloud Vulnerability DB
A community-led vulnerabilities database
PingID Windows Login prior to version 2.8 contained a security vulnerability related to improper permission settings on Windows Registry entries used for storing sensitive API keys. The vulnerability was assigned CVE-2022-23725 and was discovered and disclosed in January 2022 (CVE Mitre).
The vulnerability is classified under multiple CWE categories including CWE-288 (Authentication Bypass), CWE-287 (Improper Authentication), and CWE-522 (Insufficiently Protected Credentials) (NVD Report). The issue stems from improper permission configuration in the Windows Registry where sensitive API keys are stored, potentially exposing these credentials to unauthorized access.
The improper permission settings on Windows Registry entries could potentially expose sensitive API keys, leading to unauthorized access to PingID authentication systems and potentially compromising the security of affected systems (CVE Mitre).
The vulnerability has been addressed in PingID Windows Login version 2.8 and later. Users are advised to upgrade to the latest version of the software to resolve this security issue (Ping Downloads).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."