Content Center

AM Security Advisory #202301

Last updated Jun 6, 2024

A security vulnerability has been reported in the patches for AM 7.x versions of the #202207 security advisory. This #202301 security advisory applies to customers who have already obtained and/or applied a 202207 AM 7.x patch before February 8th, 2023. It also addresses the original security issue from #202207.

Identity Cloud customers

This security advisory does not apply to the ForgeRock Identity Cloud. This security advisory only applies to software deployments of the ForgeRock Identity Platform. 

February 2, 2023

A security vulnerability has been reported in the patches for AM 7.x versions of the #202207 security advisory. This #202301 security advisory applies to customers who have already obtained and/or applied a 202207 AM 7.x patch before February 8th, 2023. It also addresses the original security issue from #202207.

The maximum severity of issues in this advisory is Critical.

Note

The advice is to upgrade to the latest version to fix these issues. Alternatively, if that’s not possible at this time, you can apply one of the patches to mitigate these issues.

You should apply the #202301 version of the patch for all versions of AM 7.x and not apply #202207 patches. For Customers who had already raised a ticket for a custom 7.x patch, updated 202301 versions of those patches are being issued via the original support tickets.

If you have already applied the #202207 patch, please remove it immediately and replace it with a #202301 patch. An example of how to remove patches is outlined in the following knowledge base article: How do I install a PingAM (AM) patch supplied by Ping support?

You can download updated patches from Backstage for the following AM versions:

The patches address both the original #202207 as well as the #202301 issues.

See How do I install a PingAM (AM) patch supplied by Ping support? for further information on deploying the patch. 

If you need a patch for a different version or you have existing patches, please raise a support ticket to obtain an updated patch; you should provide details of your existing patches when you raise the ticket to ensure we have the relevant details. See How do I use the patchinfo utility to check what patches are installed for PingAM or PingGateway? or How do I check what patches are installed for Ping Identity Platform products? for further information.

Issue #202301-01 - Improper Authorization (CWE-285) - (CVE-2022-3748)

Affected versions AM 7.0.x, AM 7.1, AM 7.1.1, AM 7.1.2, AM 7.1.3 and AM 7.2 versions with the #202207 patch (downloaded from Backstage or a support provided custom patch).
Fixed versions AM 7.1.4, AM 7.2.1, AM 7.3 and later versions
Component Core Server
Severity Critical

Description:

A critical severity Improper Authorization (CWE-285) vulnerability has been discovered in some versions of AM that can lead to user account impersonation and takeover.

Mitigation:

None.

Resolution:

Please remove the previously installed #202207 patch (if downloaded prior to Feb 10, 2023) and apply the appropriate updated #202301 patch.

See Also

CVE-2022-3748

Change Log

The following table tracks changes to the security advisory:

Date  Description
June 6, 2024 Added “and later versions” to the Fixed versions
Sept 25, 2023 Added AM 7.1.4 as a fixed version 
April 24, 2023 Clarified which AM 7 versions are affected now some are fixed
April 18, 2023 Updated tags to improve search
April 14, 2023 Added CVE information
April 13, 2023  Made advisory available to everyone
April 5, 2023 Added fixed versions (AM 7.2.1, AM 7.3)
February 10, 2023 Added patches and updated content for AM 7.2.0, AM 7.1.3 and AM 7.1.2
February 6, 2023 Expanded visibility of this advisory to all AM customers
February 3, 2023 Expanded affected versions from 7.0.0-7.1.2 to now include all versions of 7.x
February 2, 2023 Initial release
Copyright and Trademarks Copyright © undefined ForgeRock, all rights reserved.
In this article

Visit our Community

Have questions? Find answers from our worldwide Community of experts!