A downgrade from two-factor authentication to one-factor authentication vulnerability in the CGI program of Zyxel USG/ZyWALL series firmware versions 4.32 through 4.71, USG FLEX series firmware versions 4.50 through 5.21, ATP series firmware versions 4.32 through 5.21, and VPN series firmware versions 4.32 through 5.21, that could allow an authenticated attacker to bypass the second authentication phase to connect the IPsec VPN server even though the two-factor authentication (2FA) was enabled.

Project Subscriptions

Vendors Products
Atp100 Firmware Subscribe
Atp100w Subscribe
Atp100w Firmware Subscribe
Atp200 Firmware Subscribe
Atp500 Firmware Subscribe
Atp700 Firmware Subscribe
Atp800 Firmware Subscribe
Usg200 Firmware Subscribe
Usg20 Firmware Subscribe
Usg210 Firmware Subscribe
Usg2200 Subscribe
Usg2200 Firmware Subscribe
Usg300 Firmware Subscribe
Usg310 Firmware Subscribe
Usg 110 Subscribe
Usg 1100 Subscribe
Usg 1100 Firmware Subscribe
Usg 110 Firmware Subscribe
Usg 1900 Subscribe
Usg 1900 Firmware Subscribe
Usg 20w Subscribe
Usg 20w-vpn Subscribe
Usg 20w-vpn Firmware Subscribe
Usg 20w Firmware Subscribe
Usg 2200-vpn Subscribe
Usg 2200-vpn Firmware Subscribe
Usg 310 Subscribe
Usg 310 Firmware Subscribe
Usg 40 Firmware Subscribe
Usg 40w Subscribe
Usg 40w Firmware Subscribe
Usg 60 Firmware Subscribe
Usg 60w Subscribe
Usg 60w Firmware Subscribe
Usg Flex 100 Subscribe
Usg Flex 100 Firmware Subscribe
Usg Flex 100w Subscribe
Usg Flex 100w Firmware Subscribe
Usg Flex 200 Subscribe
Usg Flex 200 Firmware Subscribe
Usg Flex 500 Subscribe
Usg Flex 500 Firmware Subscribe
Usg Flex 700 Subscribe
Usg Flex 700 Firmware Subscribe
Vpn1000 Subscribe
Vpn1000 Firmware Subscribe
Vpn100 Firmware Subscribe
Vpn300 Firmware Subscribe
Vpn50 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-15940 A downgrade from two-factor authentication to one-factor authentication vulnerability in the CGI program of Zyxel USG/ZyWALL series firmware versions 4.32 through 4.71, USG FLEX series firmware versions 4.50 through 5.21, ATP series firmware versions 4.32 through 5.21, and VPN series firmware versions 4.32 through 5.21, that could allow an authenticated attacker to bypass the second authentication phase to connect the IPsec VPN server even though the two-factor authentication (2FA) was enabled.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Zyxel

Published:

Updated: 2024-08-02T23:47:42.905Z

Reserved: 2022-03-10T00:00:00

Link: CVE-2022-0910

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-05-24T03:15:09.150

Modified: 2024-11-21T06:39:39.087

Link: CVE-2022-0910

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses