A vulnerability in the EnableTwoFactorAuthRequest SOAP endpoint of Zimbra Collaboration (ZCS) allows an attacker with valid user credentials to bypass Two-Factor Authentication (2FA) protection. The attacker can configure an additional 2FA method (either a third-party authenticator app or email-based 2FA) without presenting a valid authentication token or proving access to an already configured 2FA method. This bypasses 2FA and results in unauthorized access to accounts that are otherwise protected by 2FA.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 16 Sep 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the EnableTwoFactorAuthRequest SOAP endpoint of Zimbra Collaboration (ZCS) allows an attacker with valid user credentials to bypass Two-Factor Authentication (2FA) protection. The attacker can configure an additional 2FA method (either a third-party authenticator app or email-based 2FA) without presenting a valid authentication token or proving access to an already configured 2FA method. This bypasses 2FA and results in unauthorized access to accounts that are otherwise protected by 2FA. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-16T20:43:06.776Z
Reserved: 2025-07-21T00:00:00.000Z
Link: CVE-2025-54391

No data.

Status : Received
Published: 2025-09-16T21:15:33.880
Modified: 2025-09-16T21:15:33.880
Link: CVE-2025-54391

No data.

No data.