A vulnerability in the EnableTwoFactorAuthRequest SOAP endpoint of Zimbra Collaboration (ZCS) allows an attacker with valid user credentials to bypass Two-Factor Authentication (2FA) protection. The attacker can configure an additional 2FA method (either a third-party authenticator app or email-based 2FA) without presenting a valid authentication token or proving access to an already configured 2FA method. This bypasses 2FA and results in unauthorized access to accounts that are otherwise protected by 2FA.
History

Wed, 17 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 17 Sep 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Zimbra
Zimbra collaboration Suite
Vendors & Products Zimbra
Zimbra collaboration Suite

Tue, 16 Sep 2025 21:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in the EnableTwoFactorAuthRequest SOAP endpoint of Zimbra Collaboration (ZCS) allows an attacker with valid user credentials to bypass Two-Factor Authentication (2FA) protection. The attacker can configure an additional 2FA method (either a third-party authenticator app or email-based 2FA) without presenting a valid authentication token or proving access to an already configured 2FA method. This bypasses 2FA and results in unauthorized access to accounts that are otherwise protected by 2FA.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-09-16T00:00:00.000Z

Updated: 2025-09-17T13:57:52.062Z

Reserved: 2025-07-21T00:00:00.000Z

Link: CVE-2025-54391

cve-icon Vulnrichment

Updated: 2025-09-17T13:57:28.452Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-16T21:15:33.880

Modified: 2025-09-17T14:18:55.093

Link: CVE-2025-54391

cve-icon Redhat

No data.