
Cloud Vulnerability DB
A community-led vulnerabilities database
A Two Factor Authentication (2FA) bypass vulnerability was discovered in Nextcloud Server, tracked as CVE-2021-32800. The vulnerability affected versions prior to 20.0.12, 21.0.4, and 22.1.0, where an attacker could bypass the Two Factor Authentication mechanism. The issue was disclosed and patched in September 2021 (Nextcloud Advisory).
The vulnerability was classified as CWE-304 (Missing Critical Step in Authentication) and received a High severity rating. The issue stemmed from an improper provider check in the authentication mechanism, which allowed attackers to circumvent the 2FA protection (NVD Report).
The vulnerability allowed attackers to bypass Two Factor Authentication in Nextcloud by only requiring knowledge of a password or access to a WebAuthN trusted device of a user to gain unauthorized access to an account (Nextcloud Advisory).
The vulnerability was addressed in Nextcloud Server versions 20.0.12, 21.0.4, and 22.1.0. No workarounds were available for this vulnerability, making it critical for affected users to upgrade to the patched versions (Nextcloud Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."