{"api_version":"1","generated_at":"2026-04-23T06:19:49+00:00","cve":"CVE-2021-42000","urls":{"html":"https://cve.report/CVE-2021-42000","api":"https://cve.report/api/cve/CVE-2021-42000.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-42000","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-42000"},"summary":{"title":"CVE-2021-42000","description":"When a password reset or password change flow with an authentication policy is configured and the adapter in the reset or change policy supports multiple parallel reset flows, an existing user can reset another existing users password.","state":"PUBLIC","assigner":"responsible-disclosure@pingidentity.com","published_at":"2022-02-10 23:15:00","updated_at":"2022-08-09 00:39:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"https://www.pingidentity.com/en/resources/downloads/pingfederate.html","name":"https://www.pingidentity.com/en/resources/downloads/pingfederate.html","refsource":"MISC","tags":[],"title":"Download PingFederate | Ping Identity","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://docs.pingidentity.com/bundle/pingfederate-103/page/hhm1634833631515.html","name":"https://docs.pingidentity.com/bundle/pingfederate-103/page/hhm1634833631515.html","refsource":"MISC","tags":[],"title":"Ping Identity Documentation Portal","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-42000","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-42000","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"42000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pingidentity","cpe5":"pingfederate","cpe6":"9.3.3","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"42000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pingidentity","cpe5":"pingfederate","cpe6":"9.3.3","cpe7":"p15","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"42000","vulnerable":"1","versionEndIncluding":"10.0.11","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pingidentity","cpe5":"pingfederate","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"42000","vulnerable":"1","versionEndIncluding":"10.1.8","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pingidentity","cpe5":"pingfederate","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"42000","vulnerable":"1","versionEndIncluding":"10.2.6","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pingidentity","cpe5":"pingfederate","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"42000","vulnerable":"1","versionEndIncluding":"10.3.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pingidentity","cpe5":"pingfederate","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"42000","vulnerable":"1","versionEndIncluding":"9.3.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pingidentity","cpe5":"pingfederate","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"responsible-disclosure@pingidentity.com","ID":"CVE-2021-42000","STATE":"PUBLIC","TITLE":"Ping Identity PingFederate Password Reset and Password Change Mishandling with an authentication policy in parallel reset flows"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"PingFederate","version":{"version_data":[{"version_affected":">=","version_name":"9.3.0","version_value":"9.3.3-P15"},{"version_affected":">=","version_name":"10.0.0","version_value":"10.0.11"},{"version_affected":">=","version_name":"10.1.0","version_value":"10.1.8"},{"version_affected":">=","version_name":"10.2.0","version_value":"10.2.6"},{"version_affected":">=","version_name":"10.3.0","version_value":"10.3.2"}]}}]},"vendor_name":"Ping Identity"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"When a password reset or password change flow with an authentication policy is configured and the adapter in the reset or change policy supports multiple parallel reset flows, an existing user can reset another existing users password."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-285 Improper Authorization"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://www.pingidentity.com/en/resources/downloads/pingfederate.html","url":"https://www.pingidentity.com/en/resources/downloads/pingfederate.html"},{"refsource":"MISC","name":"https://docs.pingidentity.com/bundle/pingfederate-103/page/hhm1634833631515.html","url":"https://docs.pingidentity.com/bundle/pingfederate-103/page/hhm1634833631515.html"}]},"solution":[{"lang":"eng","value":"PingFederate product patched versions 9.3.3-P16, 10.0.12, 10.1.9, 10.2.7, 10.3.3"}],"source":{"advisory":"SECBL020","defect":["PF-29924"],"discovery":"INTERNAL"}},"nvd":{"publishedDate":"2022-02-10 23:15:00","lastModifiedDate":"2022-08-09 00:39:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":3.5},"severity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pingidentity:pingfederate:*:*:*:*:*:*:*:*","versionStartIncluding":"10.3.0","versionEndIncluding":"10.3.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pingidentity:pingfederate:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.0","versionEndIncluding":"10.2.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pingidentity:pingfederate:*:*:*:*:*:*:*:*","versionStartIncluding":"10.1.0","versionEndIncluding":"10.1.8","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pingidentity:pingfederate:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0.0","versionEndIncluding":"10.0.11","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pingidentity:pingfederate:9.3.3:p15:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pingidentity:pingfederate:*:*:*:*:*:*:*:*","versionEndIncluding":"9.3.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pingidentity:pingfederate:9.3.3:-:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"42000","Ordinal":"217830","Title":"CVE-2021-42000","CVE":"CVE-2021-42000","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"42000","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}