Improper validation of API end-point in 2N Access Commander version 3.4.2 and prior allows attacker to bypass password policy for backup file encryption.
This vulnerability can only be exploited after authenticating with administrator privileges.
References
| Link | Resource |
|---|---|
| https://www.2n.com/en-GB/download/cve_2025_59785_acom_3_5_v1pdf | Vendor Advisory |
Configurations
History
05 Mar 2026, 14:49
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
2n access Commander
2n |
|
| References | () https://www.2n.com/en-GB/download/cve_2025_59785_acom_3_5_v1pdf - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
| CPE | cpe:2.3:a:2n:access_commander:*:*:*:*:*:*:*:* |
04 Mar 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-04 16:16
Updated : 2026-03-05 14:49
NVD link : CVE-2025-59785
Mitre link : CVE-2025-59785
CVE.ORG link : CVE-2025-59785
JSON object : View
Products Affected
2n
- access_commander
CWE
CWE-1286
Improper Validation of Syntactic Correctness of Input
