A downgrade from two-factor authentication to one-factor authentication vulnerability in the CGI program of Zyxel USG/ZyWALL series firmware versions 4.32 through 4.71, USG FLEX series firmware versions 4.50 through 5.21, ATP series firmware versions 4.32 through 5.21, and VPN series firmware versions 4.32 through 5.21, that could allow an authenticated attacker to bypass the second authentication phase to connect the IPsec VPN server even though the two-factor authentication (2FA) was enabled.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Zyxel
Subscribe
|
Atp100
Subscribe
Atp100 Firmware
Subscribe
Atp100w
Subscribe
Atp100w Firmware
Subscribe
Atp200
Subscribe
Atp200 Firmware
Subscribe
Atp500
Subscribe
Atp500 Firmware
Subscribe
Atp700
Subscribe
Atp700 Firmware
Subscribe
Atp800
Subscribe
Atp800 Firmware
Subscribe
Usg20
Subscribe
Usg200
Subscribe
Usg200 Firmware
Subscribe
Usg20 Firmware
Subscribe
Usg210
Subscribe
Usg210 Firmware
Subscribe
Usg2200
Subscribe
Usg2200 Firmware
Subscribe
Usg300
Subscribe
Usg300 Firmware
Subscribe
Usg310
Subscribe
Usg310 Firmware
Subscribe
Usg 110
Subscribe
Usg 1100
Subscribe
Usg 1100 Firmware
Subscribe
Usg 110 Firmware
Subscribe
Usg 1900
Subscribe
Usg 1900 Firmware
Subscribe
Usg 20w
Subscribe
Usg 20w-vpn
Subscribe
Usg 20w-vpn Firmware
Subscribe
Usg 20w Firmware
Subscribe
Usg 2200-vpn
Subscribe
Usg 2200-vpn Firmware
Subscribe
Usg 310
Subscribe
Usg 310 Firmware
Subscribe
Usg 40
Subscribe
Usg 40 Firmware
Subscribe
Usg 40w
Subscribe
Usg 40w Firmware
Subscribe
Usg 60
Subscribe
Usg 60 Firmware
Subscribe
Usg 60w
Subscribe
Usg 60w Firmware
Subscribe
Usg Flex 100
Subscribe
Usg Flex 100 Firmware
Subscribe
Usg Flex 100w
Subscribe
Usg Flex 100w Firmware
Subscribe
Usg Flex 200
Subscribe
Usg Flex 200 Firmware
Subscribe
Usg Flex 500
Subscribe
Usg Flex 500 Firmware
Subscribe
Usg Flex 700
Subscribe
Usg Flex 700 Firmware
Subscribe
Vpn100
Subscribe
Vpn1000
Subscribe
Vpn1000 Firmware
Subscribe
Vpn100 Firmware
Subscribe
Vpn300
Subscribe
Vpn300 Firmware
Subscribe
Vpn50
Subscribe
Vpn50 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-15940 | A downgrade from two-factor authentication to one-factor authentication vulnerability in the CGI program of Zyxel USG/ZyWALL series firmware versions 4.32 through 4.71, USG FLEX series firmware versions 4.50 through 5.21, ATP series firmware versions 4.32 through 5.21, and VPN series firmware versions 4.32 through 5.21, that could allow an authenticated attacker to bypass the second authentication phase to connect the IPsec VPN server even though the two-factor authentication (2FA) was enabled. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Zyxel
Published:
Updated: 2024-08-02T23:47:42.905Z
Reserved: 2022-03-10T00:00:00
Link: CVE-2022-0910
No data.
Status : Modified
Published: 2022-05-24T03:15:09.150
Modified: 2024-11-21T06:39:39.087
Link: CVE-2022-0910
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD