Description
An insufficient granularity of access control vulnerability exists in PingIDM (formerly ForgeRock Identity Management) where administrators cannot properly configure access rules for Remote Connector Servers (RCS) running in client mode. This means attackers can spoof a client-mode RCS (if one exists) to intercept and/or modify an identity’s security-relevant properties, such as passwords and account recovery information. This issue is exploitable only when an RCS is configured to run in client mode.
INFO
Published Date :
2026-04-07T22:33:05.356Z
Last Modified :
2026-04-08T15:16:29.865Z
Source :
Ping Identity
AFFECTED PRODUCTS
The following products are affected by CVE-2025-20628 vulnerability.
| Vendors | Products |
|---|---|
| Pingidentity |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-20628.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability