Description
Improper handling of factor key state in the multi-factor authentication management feature in Devolutions Server allows an attacker with knowledge of a user's password to bypass the user's multi-factor authentication after the user reconfigures their factors.

This issue affects :

* Devolutions Server 2026.1.6.0 through 2026.1.16.0
Published: 2026-05-22
Score: 7.6 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Improper handling of factor key state in the multi‑factor authentication management feature of Devolutions Server allows an attacker who knows a user’s password to bypass that user’s multi‑factor authentication after the user reconfigures their authentication factors. The flaw is a classical authentication bypass identified as CWE‑305 and results in the attacker gaining elevated access rights by circumventing an otherwise mandatory second factor. This would compromise the confidentiality and integrity of the affected account and any resources the account controls.

Affected Systems

The vulnerability affects Devolutions Server versions 2026.1.6.0 through 2026.1.16.0. Administrators should confirm that their deployed server falls within this range and assess the impact on all users whose multi‑factor credentials may have been recently reconfigured.

Risk and Exploitability

Because the attacker must already know the user’s password, the primary attack vector is a credential‑compromise scenario. Once the password is known, the attacker can perform the reconfiguration step that would normally trigger healthy MFA prompts, thereby bypassing further authentication checks. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, but the impact of defeating MFA is severe in environments that rely on the second factor for access control. The CVSS score is 7.6. The lack of a publicly disclosed exploitation pipeline suggests that the flaw is not immediately exploitable, however the risk remains high for compromised accounts.

Generated by OpenCVE AI on May 22, 2026 at 18:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Devolutions Server to a version newer than 2026.1.16.0 or apply the vendor‑issued patch that addresses the factor key state handling flaw.
  • Verify that all users who have recently reconfigured their multi‑factor authentication have updated their credentials and re‑enabled factors after the patch.
  • Enable strict monitoring of login attempts to detect unauthorized access, especially following password compromises.
  • If an immediate patch is unavailable, restrict the ability for users to reconfigure factors until a fix is applied, or enforce the use of additional backup authentication methods during the interim.

Generated by OpenCVE AI on May 22, 2026 at 18:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 19:15:00 +0000

Type Values Removed Values Added
Title Multi‑factor Authentication Bypass After Factor Reconfiguration

Fri, 22 May 2026 17:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 22 May 2026 16:45:00 +0000

Type Values Removed Values Added
Title Multi‑factor Authentication Bypass After Factor Reconfiguration
First Time appeared Devolutions
Devolutions server
Vendors & Products Devolutions
Devolutions server

Fri, 22 May 2026 15:45:00 +0000

Type Values Removed Values Added
Description Improper handling of factor key state in the multi-factor authentication management feature in Devolutions Server allows an attacker with knowledge of a user's password to bypass the user's multi-factor authentication after the user reconfigures their factors. This issue affects : * Devolutions Server 2026.1.6.0 through 2026.1.16.0
Weaknesses CWE-305
References

Subscriptions

Devolutions Server
cve-icon MITRE

Status: PUBLISHED

Assigner: DEVOLUTIONS

Published:

Updated: 2026-05-22T16:58:40.924Z

Reserved: 2026-05-19T19:17:26.747Z

Link: CVE-2026-9047

cve-icon Vulnrichment

Updated: 2026-05-22T16:58:22.554Z

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T19:00:15Z

Weaknesses