Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required Low
Scope Unchanged
Confidentiality Impact None
Integrity Impact High
Availability Impact None
User Interaction None
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication Single
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
This CVE is not in the KEV list.
The EPSS score is 0.00152.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Zyxel
Subscribe
|
Atp100
Subscribe
Atp100 Firmware
Subscribe
Atp100w
Subscribe
Atp100w Firmware
Subscribe
Atp200
Subscribe
Atp200 Firmware
Subscribe
Atp500
Subscribe
Atp500 Firmware
Subscribe
Atp700
Subscribe
Atp700 Firmware
Subscribe
Atp800
Subscribe
Atp800 Firmware
Subscribe
Usg20
Subscribe
Usg200
Subscribe
Usg200 Firmware
Subscribe
Usg20 Firmware
Subscribe
Usg210
Subscribe
Usg210 Firmware
Subscribe
Usg2200
Subscribe
Usg2200 Firmware
Subscribe
Usg300
Subscribe
Usg300 Firmware
Subscribe
Usg310
Subscribe
Usg310 Firmware
Subscribe
Usg 110
Subscribe
Usg 1100
Subscribe
Usg 1100 Firmware
Subscribe
Usg 110 Firmware
Subscribe
Usg 1900
Subscribe
Usg 1900 Firmware
Subscribe
Usg 20w
Subscribe
Usg 20w-vpn
Subscribe
Usg 20w-vpn Firmware
Subscribe
Usg 20w Firmware
Subscribe
Usg 2200-vpn
Subscribe
Usg 2200-vpn Firmware
Subscribe
Usg 310
Subscribe
Usg 310 Firmware
Subscribe
Usg 40
Subscribe
Usg 40 Firmware
Subscribe
Usg 40w
Subscribe
Usg 40w Firmware
Subscribe
Usg 60
Subscribe
Usg 60 Firmware
Subscribe
Usg 60w
Subscribe
Usg 60w Firmware
Subscribe
Usg Flex 100
Subscribe
Usg Flex 100 Firmware
Subscribe
Usg Flex 100w
Subscribe
Usg Flex 100w Firmware
Subscribe
Usg Flex 200
Subscribe
Usg Flex 200 Firmware
Subscribe
Usg Flex 500
Subscribe
Usg Flex 500 Firmware
Subscribe
Usg Flex 700
Subscribe
Usg Flex 700 Firmware
Subscribe
Vpn100
Subscribe
Vpn1000
Subscribe
Vpn1000 Firmware
Subscribe
Vpn100 Firmware
Subscribe
Vpn300
Subscribe
Vpn300 Firmware
Subscribe
Vpn50
Subscribe
Vpn50 Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
Configuration 29 [-]
| AND |
|
Configuration 30 [-]
| AND |
|
Configuration 31 [-]
| AND |
|
Configuration 32 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-15940 | A downgrade from two-factor authentication to one-factor authentication vulnerability in the CGI program of Zyxel USG/ZyWALL series firmware versions 4.32 through 4.71, USG FLEX series firmware versions 4.50 through 5.21, ATP series firmware versions 4.32 through 5.21, and VPN series firmware versions 4.32 through 5.21, that could allow an authenticated attacker to bypass the second authentication phase to connect the IPsec VPN server even though the two-factor authentication (2FA) was enabled. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Zyxel
Published:
Updated: 2024-08-02T23:47:42.905Z
Reserved: 2022-03-10T00:00:00
Link: CVE-2022-0910
No data.
Status : Modified
Published: 2022-05-24T03:15:09.150
Modified: 2024-11-21T06:39:39.087
Link: CVE-2022-0910
No data.
OpenCVE Enrichment
No data.
EUVD