First published: Tue May 24 2022(Updated: )
A downgrade from two-factor authentication to one-factor authentication vulnerability in the CGI program of Zyxel USG/ZyWALL series firmware versions 4.32 through 4.71, USG FLEX series firmware versions 4.50 through 5.21, ATP series firmware versions 4.32 through 5.21, and VPN series firmware versions 4.32 through 5.21, that could allow an authenticated attacker to bypass the second authentication phase to connect the IPsec VPN server even though the two-factor authentication (2FA) was enabled.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel VPN100 | >=4.32<=5.21 | |
Zyxel Zywall VPN100 | ||
Zyxel VPN1000 Firmware | >=4.32<=5.21 | |
Zyxel VPN1000 Firmware | ||
Zyxel Zywall VPN 300 Firmware | >=4.32<=5.21 | |
Zyxel Zywall VPN300 | ||
Zyxel Zywall VPN 50 Firmware | >=4.32<=5.21 | |
Zyxel VPN50 Firmware | ||
Zyxel ZyWall ATP100 Firmware | >=4.32<=5.21 | |
Zyxel ATP100 Firmware | ||
Zyxel ATP100W Firmware | >=4.32<=5.21 | |
Zyxel ATP100W Firmware | ||
Zyxel ATP200 firmware | >=4.32<=5.21 | |
Zyxel Zywall ATP200 | ||
Zyxel ATP500 Firmware | >=4.32<=5.21 | |
Zyxel ATP500 Firmware | ||
Zyxel Zywall ATP700 | >=4.32<=5.21 | |
Zyxel ATP700 Firmware | ||
Zyxel Zywall ATP800 Firmware | >=4.32<=5.21 | |
Zyxel Zywall ATP800 Firmware | ||
Zyxel USG 110 | >=4.32<=4.71 | |
Zyxel USG 110 Firmware | ||
Zyxel USG1100 firmware | >=4.32<=4.71 | |
Zyxel USG 1100 firmware | ||
Zyxel USG1900 Firmware | >=4.32<=4.71 | |
Zyxel USG1900 | ||
Zyxel USG 20W | >=4.32<=4.71 | |
Zyxel USG20 | ||
Zyxel USG 20W-VPN Firmware | >=4.32<=4.71 | |
Zyxel USG20 | ||
Zyxel USG2200-VPN Firmware | >=4.32<=4.71 | |
Zyxel USG2200-VPN Firmware | ||
Zyxel ZyWALL USG 310 firmware | >=4.32<=4.71 | |
Zyxel ZyWALL USG 310 | ||
Zyxel USG40W Firmware | >=4.32<=4.71 | |
Zyxel USG40W | ||
Zyxel USG40W Firmware | >=4.32<=4.71 | |
Zyxel USG40W | ||
Zyxel USG60 Firmware | >=4.32<=4.71 | |
Zyxel USG60 Firmware | ||
Zyxel USG60W Firmware | >=4.32<=4.71 | |
Zyxel USG 60w firmware | ||
Zyxel USG Flex 100 firmware | >=4.50<=5.21 | |
Zyxel USG Flex 100 firmware | ||
Zyxel USG FLEX 100w firmware | >=4.50<=5.21 | |
Zyxel USG FLEX 100w firmware | ||
Zyxel USG FLEX firmware | >=4.50<=5.21 | |
Zyxel USG FLEX 200 firmware | ||
Zyxel USG FLEX firmware | >=4.50<=5.21 | |
Zyxel USG FLEX 500 firmware | ||
Zyxel USG FLEX firmware | >=4.50<=5.21 | |
Zyxel USG FLEX 700 firmware | ||
Zyxel USG200 Firmware | >=4.32<=4.71 | |
Zyxel USG200 Firmware | ||
Zyxel USG20-VPN Firmware | >=4.32<=4.71 | |
Zyxel USG20 Firmware | ||
Zyxel USG210 Firmware | >=4.32<=4.71 | |
Zyxel USG210 Firmware | ||
Zyxel USG2200-VPN Firmware | >=4.32<=4.71 | |
Zyxel USG2200-VPN | ||
Zyxel USG300 Firmware | >=4.32<=4.71 | |
Zyxel USG300 Firmware | ||
Zyxel USG 310 firmware | >=4.32<=4.71 | |
Zyxel USG 310 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0910 has been rated as a high severity vulnerability due to its potential to downgrade authentication methods.
To remediate CVE-2022-0910, upgrade your Zyxel USG/ZyWALL, USG FLEX, ATP, or VPN series firmware to a version that is not affected.
CVE-2022-0910 affects various Zyxel devices including the USG/ZyWALL series, USG FLEX series, ATP series, and VPN series running specific firmware versions.
CVE-2022-0910 exploits a flaw that allows attackers to downgrade two-factor authentication to one-factor authentication.
If your Zyxel device is running any of the vulnerable firmware versions listed for CVE-2022-0910, it is indeed at risk and should be updated.