6.5

CVE-2022-0910

A downgrade from two-factor authentication to one-factor authentication vulnerability in the CGI program of Zyxel USG/ZyWALL series firmware versions 4.32 through 4.71, USG FLEX series firmware versions 4.50 through 5.21, ATP series firmware versions 4.32 through 5.21, and VPN series firmware versions 4.32 through 5.21, that could allow an authenticated attacker to bypass the second authentication phase to connect the IPsec VPN server even though the two-factor authentication (2FA) was enabled.

Data is provided by the National Vulnerability Database (NVD)
ZyxelVpn100 Firmware Version >= 4.32 <= 5.21
   ZyxelVpn100 Version-
ZyxelVpn1000 Firmware Version >= 4.32 <= 5.21
   ZyxelVpn1000 Version-
ZyxelVpn300 Firmware Version >= 4.32 <= 5.21
   ZyxelVpn300 Version-
ZyxelVpn50 Firmware Version >= 4.32 <= 5.21
   ZyxelVpn50 Version-
ZyxelAtp100 Firmware Version >= 4.32 <= 5.21
   ZyxelAtp100 Version-
ZyxelAtp100w Firmware Version >= 4.32 <= 5.21
   ZyxelAtp100w Version-
ZyxelAtp200 Firmware Version >= 4.32 <= 5.21
   ZyxelAtp200 Version-
ZyxelAtp500 Firmware Version >= 4.32 <= 5.21
   ZyxelAtp500 Version-
ZyxelAtp700 Firmware Version >= 4.32 <= 5.21
   ZyxelAtp700 Version-
ZyxelAtp800 Firmware Version >= 4.32 <= 5.21
   ZyxelAtp800 Version-
ZyxelUsg 110 Firmware Version >= 4.32 <= 4.71
   ZyxelUsg 110 Version-
ZyxelUsg 1100 Firmware Version >= 4.32 <= 4.71
   ZyxelUsg 1100 Version-
ZyxelUsg 1900 Firmware Version >= 4.32 <= 4.71
   ZyxelUsg 1900 Version-
ZyxelUsg 20w Firmware Version >= 4.32 <= 4.71
   ZyxelUsg 20w Version-
ZyxelUsg 20w-vpn Firmware Version >= 4.32 <= 4.71
   ZyxelUsg 20w-vpn Version-
ZyxelUsg 2200-vpn Firmware Version >= 4.32 <= 4.71
   ZyxelUsg 2200-vpn Version-
ZyxelUsg 310 Firmware Version >= 4.32 <= 4.71
   ZyxelUsg 310 Version-
ZyxelUsg 40 Firmware Version >= 4.32 <= 4.71
   ZyxelUsg 40 Version-
ZyxelUsg 40w Firmware Version >= 4.32 <= 4.71
   ZyxelUsg 40w Version-
ZyxelUsg 60 Firmware Version >= 4.32 <= 4.71
   ZyxelUsg 60 Version-
ZyxelUsg 60w Firmware Version >= 4.32 <= 4.71
   ZyxelUsg 60w Version-
ZyxelUsg Flex 100 Firmware Version >= 4.50 <= 5.21
   ZyxelUsg Flex 100 Version-
ZyxelUsg Flex 100w Firmware Version >= 4.50 <= 5.21
   ZyxelUsg Flex 100w Version-
ZyxelUsg Flex 200 Firmware Version >= 4.50 <= 5.21
   ZyxelUsg Flex 200 Version-
ZyxelUsg Flex 500 Firmware Version >= 4.50 <= 5.21
   ZyxelUsg Flex 500 Version-
ZyxelUsg Flex 700 Firmware Version >= 4.50 <= 5.21
   ZyxelUsg Flex 700 Version-
ZyxelUsg200 Firmware Version >= 4.32 <= 4.71
   ZyxelUsg200 Version-
ZyxelUsg20 Firmware Version >= 4.32 <= 4.71
   ZyxelUsg20 Version-
ZyxelUsg210 Firmware Version >= 4.32 <= 4.71
   ZyxelUsg210 Version-
ZyxelUsg2200 Firmware Version >= 4.32 <= 4.71
   ZyxelUsg2200 Version-
ZyxelUsg300 Firmware Version >= 4.32 <= 4.71
   ZyxelUsg300 Version-
ZyxelUsg310 Firmware Version >= 4.32 <= 4.71
   ZyxelUsg310 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.15% 0.364
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
nvd@nist.gov 4 8 2.9
AV:N/AC:L/Au:S/C:N/I:P/A:N
security@zyxel.com.tw 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.