CVE-2022-0910
Severity CVSS v4.0:
Pending analysis
Type:
CWE-287
Authentication Issues
Publication date:
24/05/2022
Last modified:
06/06/2022
Description
A downgrade from two-factor authentication to one-factor authentication vulnerability in the CGI program of Zyxel USG/ZyWALL series firmware versions 4.32 through 4.71, USG FLEX series firmware versions 4.50 through 5.21, ATP series firmware versions 4.32 through 5.21, and VPN series firmware versions 4.32 through 5.21, that could allow an authenticated attacker to bypass the second authentication phase to connect the IPsec VPN server even though the two-factor authentication (2FA) was enabled.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:zyxel:vpn100_firmware:*:*:*:*:*:*:*:* | 4.32 (including) | 5.21 (including) |
| cpe:2.3:h:zyxel:vpn100:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:vpn1000_firmware:*:*:*:*:*:*:*:* | 4.32 (including) | 5.21 (including) |
| cpe:2.3:h:zyxel:vpn1000:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:vpn300_firmware:*:*:*:*:*:*:*:* | 4.32 (including) | 5.21 (including) |
| cpe:2.3:h:zyxel:vpn300:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:vpn50_firmware:*:*:*:*:*:*:*:* | 4.32 (including) | 5.21 (including) |
| cpe:2.3:h:zyxel:vpn50:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:* | 4.32 (including) | 5.21 (including) |
| cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:* | 4.32 (including) | 5.21 (including) |
| cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:* | 4.32 (including) | 5.21 (including) |
| cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:* | 4.32 (including) | 5.21 (including) |
To consult the complete list of CPE names with products and versions, see this page



