This vulnerability can only be exploited after authenticating with administrator privileges.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 05 Mar 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:2n:access_commander:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Thu, 05 Mar 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
2n
2n access Commander |
|
| Vendors & Products |
2n
2n access Commander |
Wed, 04 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Mar 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper validation of API end-point in 2N Access Commander version 3.4.2 and prior allows attacker to bypass password policy for backup file encryption. This vulnerability can only be exploited after authenticating with administrator privileges. | |
| Title | API - Insufficient Input Validation | |
| Weaknesses | CWE-1286 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: 2N
Published:
Updated: 2026-03-04T16:17:08.636Z
Reserved: 2025-09-19T17:22:49.648Z
Link: CVE-2025-59785
Updated: 2026-03-04T16:17:05.390Z
Status : Analyzed
Published: 2026-03-04T16:16:25.307
Modified: 2026-03-05T14:49:55.090
Link: CVE-2025-59785
No data.
OpenCVE Enrichment
Updated: 2026-03-05T09:08:39Z