Vulnerability Details : CVE-2022-0910
A downgrade from two-factor authentication to one-factor authentication vulnerability in the CGI program of Zyxel USG/ZyWALL series firmware versions 4.32 through 4.71, USG FLEX series firmware versions 4.50 through 5.21, ATP series firmware versions 4.32 through 5.21, and VPN series firmware versions 4.32 through 5.21, that could allow an authenticated attacker to bypass the second authentication phase to connect the IPsec VPN server even though the two-factor authentication (2FA) was enabled.
Vulnerability category: BypassGain privilege
Products affected by CVE-2022-0910
- cpe:2.3:o:zyxel:usg_20w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_40_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_40w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_60_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_60w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_110_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_2200-vpn_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_310_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_1100_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_1900_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_20w-vpn_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg210_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg310_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:vpn50_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:vpn100_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:vpn300_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg2200_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:vpn1000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg300_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg20_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg200_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-0910
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 20 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-0910
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:P/A:N |
8.0
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
2.8
|
3.6
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
2.8
|
3.6
|
Zyxel Corporation |
CWE ids for CVE-2022-0910
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by:
- nvd@nist.gov (Primary)
- security@zyxel.com.tw (Secondary)
References for CVE-2022-0910
-
https://www.zyxel.com/support/multiple-vulnerabilities-of-firewalls-AP-controllers-and-APs.shtml
Zyxel security advisory for multiple vulnerabilities of firewalls, AP controllers, and APs | ZyxelVendor Advisory
Jump to