CVE-2025-59787
- EPSS 0.05%
- Veröffentlicht 04.03.2026 15:31:59
- Zuletzt bearbeitet 05.03.2026 14:26:26
2N Access Commander application version 3.4.2 and prior returns HTTP 500 Internal Server Error responses when receiving malformed or manipulated requests, indicating improper handling of invalid input and potential security or availability impacts.
CVE-2025-59786
- EPSS 0.06%
- Veröffentlicht 04.03.2026 15:30:35
- Zuletzt bearbeitet 05.03.2026 14:30:45
2N Access Commander version 3.4.2 and prior improperly invalidates session tokens, allowing multiple session cookies to remain active after logout in web application.
CVE-2025-59785
- EPSS 0.05%
- Veröffentlicht 04.03.2026 15:30:31
- Zuletzt bearbeitet 05.03.2026 14:49:55
Improper validation of API end-point in 2N Access Commander version 3.4.2 and prior allows attacker to bypass password policy for backup file encryption. This vulnerability can only be exploited after authenticating with administrator privileges.
CVE-2025-59784
- EPSS 0.06%
- Veröffentlicht 04.03.2026 15:26:47
- Zuletzt bearbeitet 05.03.2026 15:02:20
2N Access Commander version 3.4.1 and prior is vulnerable to log pollution. Certain parameters sent over API may be included in the logs without prior validation or sanitisation. This vulnerability can only be exploited after authenticating with admi...
CVE-2025-59783
- EPSS 0.14%
- Veröffentlicht 04.03.2026 15:19:13
- Zuletzt bearbeitet 05.03.2026 15:05:07
API endpoint for user synchronization in 2N Access Commander version 3.4.1 did not have a sufficient input validation allowing for OS command injection. This vulnerability can only be exploited after authenticating with administrator privileges.
- EPSS 0.03%
- Veröffentlicht 06.02.2025 20:15:39
- Zuletzt bearbeitet 15.04.2026 00:35:42
Successful exploitation of this vulnerability could allow an attacker (who needs to have Admin access privileges) to read hardcoded AES passphrase, which may be used for decryption of certain data within backup files of 2N Access Commander version 1....
CVE-2024-47258
- EPSS 0.07%
- Veröffentlicht 06.02.2025 20:15:39
- Zuletzt bearbeitet 15.04.2026 00:35:42
2N Access Commander version 2.1 and prior is vulnerable in default settings to Man In The Middle attack due to not verifying certificates of 2N edge devices. 2N has currently released an updated version 3.3 of 2N Access Commander, with added Ce...
CVE-2024-47255
- EPSS 0.03%
- Veröffentlicht 05.11.2024 10:20:05
- Zuletzt bearbeitet 04.09.2025 10:42:25
In 2N Access Commander versions 3.1.1.2 and prior, a local attacker can escalate their privileges in the system which could allow for arbitrary code execution with root permissions.
CVE-2024-47254
- EPSS 0.23%
- Veröffentlicht 05.11.2024 10:20:04
- Zuletzt bearbeitet 04.09.2025 10:42:25
In 2N Access Commander versions 3.1.1.2 and prior, an Insufficient Verification of Data Authenticity vulnerability could allow an attacker to escalate their privileges and gain root access to the system.
CVE-2024-47253
- EPSS 5.36%
- Veröffentlicht 05.11.2024 10:20:03
- Zuletzt bearbeitet 07.11.2024 12:15:24
In 2N Access Commander versions 3.1.1.2 and prior, a Path Traversal vulnerability could allow an attacker with administrative privileges to write files on the filesystem and potentially achieve arbitrary remote code execution. This vulnerability cann...