Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2025-29653 | A vulnerability in the EnableTwoFactorAuthRequest SOAP endpoint of Zimbra Collaboration (ZCS) allows an attacker with valid user credentials to bypass Two-Factor Authentication (2FA) protection. The attacker can configure an additional 2FA method (either a third-party authenticator app or email-based 2FA) without presenting a valid authentication token or proving access to an already configured 2FA method. This bypasses 2FA and results in unauthorized access to accounts that are otherwise protected by 2FA. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 17 Sep 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-284 | |
Metrics |
cvssV3_1
|
Wed, 17 Sep 2025 11:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Zimbra
Zimbra collaboration Suite |
|
Vendors & Products |
Zimbra
Zimbra collaboration Suite |
Tue, 16 Sep 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the EnableTwoFactorAuthRequest SOAP endpoint of Zimbra Collaboration (ZCS) allows an attacker with valid user credentials to bypass Two-Factor Authentication (2FA) protection. The attacker can configure an additional 2FA method (either a third-party authenticator app or email-based 2FA) without presenting a valid authentication token or proving access to an already configured 2FA method. This bypasses 2FA and results in unauthorized access to accounts that are otherwise protected by 2FA. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-17T13:57:52.062Z
Reserved: 2025-07-21T00:00:00.000Z
Link: CVE-2025-54391

Updated: 2025-09-17T13:57:28.452Z

Status : Awaiting Analysis
Published: 2025-09-16T21:15:33.880
Modified: 2025-09-17T14:18:55.093
Link: CVE-2025-54391

No data.

Updated: 2025-09-17T10:04:49Z