ID

VAR-202205-1787


CVE

CVE-2022-0910


TITLE

Zyxel USG/ZyWALL Authorization problem vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202205-3996

DESCRIPTION

A downgrade from two-factor authentication to one-factor authentication vulnerability in the CGI program of Zyxel USG/ZyWALL series firmware versions 4.32 through 4.71, USG FLEX series firmware versions 4.50 through 5.21, ATP series firmware versions 4.32 through 5.21, and VPN series firmware versions 4.32 through 5.21, that could allow an authenticated attacker to bypass the second authentication phase to connect the IPsec VPN server even though the two-factor authentication (2FA) was enabled.

Trust: 1.0

sources: NVD: CVE-2022-0910

AFFECTED PRODUCTS

vendor:zyxelmodel:usg flex 200scope:lteversion:5.21

Trust: 1.0

vendor:zyxelmodel:vpn100scope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:usg200scope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:vpn1000scope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:usg flex 100wscope:lteversion:5.21

Trust: 1.0

vendor:zyxelmodel:usg2200scope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:atp800scope:lteversion:5.21

Trust: 1.0

vendor:zyxelmodel:vpn50scope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:atp800scope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:usg 20wscope:lteversion:4.71

Trust: 1.0

vendor:zyxelmodel:usg310scope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:usg 20w-vpnscope:lteversion:4.71

Trust: 1.0

vendor:zyxelmodel:atp700scope:lteversion:5.21

Trust: 1.0

vendor:zyxelmodel:usg20scope:lteversion:4.71

Trust: 1.0

vendor:zyxelmodel:usg300scope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:atp100scope:lteversion:5.21

Trust: 1.0

vendor:zyxelmodel:usg 2200-vpnscope:lteversion:4.71

Trust: 1.0

vendor:zyxelmodel:atp500scope:lteversion:5.21

Trust: 1.0

vendor:zyxelmodel:usg 60scope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:usg flex 500scope:gteversion:4.50

Trust: 1.0

vendor:zyxelmodel:usg flex 500scope:lteversion:5.21

Trust: 1.0

vendor:zyxelmodel:usg 40scope:lteversion:4.71

Trust: 1.0

vendor:zyxelmodel:usg 60wscope:lteversion:4.71

Trust: 1.0

vendor:zyxelmodel:usg 110scope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:atp700scope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:usg 1900scope:lteversion:4.71

Trust: 1.0

vendor:zyxelmodel:usg 40wscope:lteversion:4.71

Trust: 1.0

vendor:zyxelmodel:vpn300scope:lteversion:5.21

Trust: 1.0

vendor:zyxelmodel:atp100wscope:lteversion:5.21

Trust: 1.0

vendor:zyxelmodel:atp500scope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:usg 20wscope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:usg20scope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:usg 1100scope:lteversion:4.71

Trust: 1.0

vendor:zyxelmodel:usg210scope:lteversion:4.71

Trust: 1.0

vendor:zyxelmodel:usg 1900scope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:usg 310scope:lteversion:4.71

Trust: 1.0

vendor:zyxelmodel:atp100scope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:atp100wscope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:vpn100scope:lteversion:5.21

Trust: 1.0

vendor:zyxelmodel:atp200scope:lteversion:5.21

Trust: 1.0

vendor:zyxelmodel:usg 20w-vpnscope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:usg200scope:lteversion:4.71

Trust: 1.0

vendor:zyxelmodel:usg310scope:lteversion:4.71

Trust: 1.0

vendor:zyxelmodel:usg 2200-vpnscope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:usg flex 100scope:gteversion:4.50

Trust: 1.0

vendor:zyxelmodel:usg 40wscope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:vpn1000scope:lteversion:5.21

Trust: 1.0

vendor:zyxelmodel:usg 40scope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:usg 60wscope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:usg2200scope:lteversion:4.71

Trust: 1.0

vendor:zyxelmodel:usg 1100scope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:usg300scope:lteversion:4.71

Trust: 1.0

vendor:zyxelmodel:usg flex 100scope:lteversion:5.21

Trust: 1.0

vendor:zyxelmodel:vpn300scope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:usg flex 700scope:lteversion:5.21

Trust: 1.0

vendor:zyxelmodel:atp200scope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:vpn50scope:lteversion:5.21

Trust: 1.0

vendor:zyxelmodel:usg 110scope:lteversion:4.71

Trust: 1.0

vendor:zyxelmodel:usg flex 700scope:gteversion:4.50

Trust: 1.0

vendor:zyxelmodel:usg210scope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:usg flex 200scope:gteversion:4.50

Trust: 1.0

vendor:zyxelmodel:usg 60scope:lteversion:4.71

Trust: 1.0

vendor:zyxelmodel:usg 310scope:gteversion:4.32

Trust: 1.0

vendor:zyxelmodel:usg flex 100wscope:gteversion:4.50

Trust: 1.0

sources: NVD: CVE-2022-0910

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2022-0910
value: MEDIUM

Trust: 1.0

security@zyxel.com.tw: CVE-2022-0910
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-202205-3996
value: MEDIUM

Trust: 0.6

NVD:
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD:
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 2.0

sources: NVD: CVE-2022-0910 // NVD: CVE-2022-0910 // CNNVD: CNNVD-202205-3996

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.0

sources: NVD: CVE-2022-0910

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202205-3996

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-202205-3996

CONFIGURATIONS

sources: NVD: CVE-2022-0910

PATCH

title:Zyxel USG/ZyWALL Remediation measures for authorization problem vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=195229

Trust: 0.6

sources: CNNVD: CNNVD-202205-3996

EXTERNAL IDS

db:NVDid:CVE-2022-0910

Trust: 1.6

db:CS-HELPid:SB2022052406

Trust: 0.6

db:CNNVDid:CNNVD-202205-3996

Trust: 0.6

sources: NVD: CVE-2022-0910 // CNNVD: CNNVD-202205-3996

REFERENCES

url:https://www.zyxel.com/support/multiple-vulnerabilities-of-firewalls-ap-controllers-and-aps.shtml

Trust: 1.6

url:https://www.cybersecurity-help.cz/vdb/sb2022052406

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-0910/

Trust: 0.6

sources: NVD: CVE-2022-0910 // CNNVD: CNNVD-202205-3996

SOURCES

db:NVDid:CVE-2022-0910
db:CNNVDid:CNNVD-202205-3996

LAST UPDATE DATE

2023-12-18T13:22:23.047000+00:00


SOURCES UPDATE DATE

db:NVDid:CVE-2022-0910date:2022-06-06T18:17:43.570
db:CNNVDid:CNNVD-202205-3996date:2022-06-08T00:00:00

SOURCES RELEASE DATE

db:NVDid:CVE-2022-0910date:2022-05-24T03:15:09.150
db:CNNVDid:CNNVD-202205-3996date:2022-05-24T00:00:00