CVE-2025-59785

Improper validation of API end-point in 2N Access Commander version 3.4.2 and prior allows attacker to bypass password policy for backup file encryption. This vulnerability can only be exploited after authenticating with administrator privileges.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:2n:access_commander:*:*:*:*:*:*:*:*

History

05 Mar 2026, 14:49

Type Values Removed Values Added
First Time 2n access Commander
2n
References () https://www.2n.com/en-GB/download/cve_2025_59785_acom_3_5_v1pdf - () https://www.2n.com/en-GB/download/cve_2025_59785_acom_3_5_v1pdf - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
CPE cpe:2.3:a:2n:access_commander:*:*:*:*:*:*:*:*

04 Mar 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-04 16:16

Updated : 2026-03-05 14:49


NVD link : CVE-2025-59785

Mitre link : CVE-2025-59785

CVE.ORG link : CVE-2025-59785


JSON object : View

Products Affected

2n

  • access_commander
CWE
CWE-1286

Improper Validation of Syntactic Correctness of Input