This vulnerability can only be exploited after authenticating with administrator privileges.
No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 05 Mar 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:2n:access_commander:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Thu, 05 Mar 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
2n
2n access Commander |
|
| Vendors & Products |
2n
2n access Commander |
Wed, 04 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Mar 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper validation of API end-point in 2N Access Commander version 3.4.2 and prior allows attacker to bypass password policy for backup file encryption. This vulnerability can only be exploited after authenticating with administrator privileges. | |
| Title | API - Insufficient Input Validation | |
| Weaknesses | CWE-1286 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: 2N
Published:
Updated: 2026-03-04T16:17:08.636Z
Reserved: 2025-09-19T17:22:49.648Z
Link: CVE-2025-59785
Updated: 2026-03-04T16:17:05.390Z
Status : Analyzed
Published: 2026-03-04T16:16:25.307
Modified: 2026-03-05T14:49:55.090
Link: CVE-2025-59785
No data.
OpenCVE Enrichment
Updated: 2026-03-05T09:08:39Z