An insufficient granularity of access control vulnerability exists in PingIDM (formerly ForgeRock Identity Management) where administrators cannot properly configure access rules for Remote Connector Servers (RCS) running in client mode. This means attackers can spoof a client-mode RCS (if one exists) to intercept and/or modify an identity’s security-relevant properties, such as passwords and account recovery information. This issue is exploitable only when an RCS is configured to run in client mode.
Advisories

No advisories yet.

Fixes

Solution

Both of the following steps are required to mitigate the issue: * Upgrade to one of the fixed versions listed previously. * Secure the /openicf endpoint using the new access and authentication configuration options (refer to  migration dependent features  https://docs.pingidentity.com/pingoneaic/latest/product-information/migration-dependent-features.html#current_migration_dependent_features for more details).


Workaround

Configure a reverse proxy (such as PingGateway) to enforce IP and certificate-based rules to the /openicf endpoint.

History

Tue, 07 Apr 2026 22:45:00 +0000

Type Values Removed Values Added
Description An insufficient granularity of access control vulnerability exists in PingIDM (formerly ForgeRock Identity Management) where administrators cannot properly configure access rules for Remote Connector Servers (RCS) running in client mode. This means attackers can spoof a client-mode RCS (if one exists) to intercept and/or modify an identity’s security-relevant properties, such as passwords and account recovery information. This issue is exploitable only when an RCS is configured to run in client mode.
Title Insufficient granularity of access control for Remote Connector Servers in client mode
Weaknesses CWE-1220
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/S:P/AU:Y/R:U/V:C/RE:M/U:Red'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Ping Identity

Published:

Updated: 2026-04-07T22:33:05.356Z

Reserved: 2025-01-13T16:41:43.939Z

Link: CVE-2025-20628

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-07T23:16:27.040

Modified: 2026-04-07T23:16:27.040

Link: CVE-2025-20628

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses