CVE-2025-59787
Improper Input Handling in 2N Access Commander Causes HTTP 500 Errors
Publication date: 2026-03-04
Last updated on: 2026-03-05
Assigner: be69f613-e5f6-419b-800c-30351aa8933c
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| 2n | access_commander | to 3.5 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-703 | The product does not properly anticipate or handle exceptional conditions that rarely occur during normal operation of the product. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the 2N Access Commander application version 3.4.2 and earlier. When the application receives malformed or manipulated requests, it responds with HTTP 500 Internal Server Error messages. This behavior indicates that the application does not properly handle invalid input, which can lead to potential security or availability issues.
How can this vulnerability impact me? :
The improper handling of invalid input causing HTTP 500 errors can impact the availability of the 2N Access Commander application. Attackers might exploit this behavior to disrupt service or cause denial of service conditions, affecting the reliability and accessibility of the system.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know