Successful exploitation of this vulnerability could allow an attacker (who needs to have Admin access privileges) to read hardcoded AES passphrase, which may be used for decryption of certain data within backup files of 2N Access Commander version 1.14 and older.
2N has released an updated version 3.3 of 2N Access Commander, where this vulnerability is mitigated. It is recommended that all customers update 2N Access Commander to the latest version.
Metrics
Affected Vendors & Products
References
History
Fri, 21 Feb 2025 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Successful exploitation of this vulnerability could allow an attacker (who needs to have Admin access privileges) to read hardcoded AES passphrase, which may be used for decryption of certain data within backup files of 2N Access Commander version 1.14 and older. | Successful exploitation of this vulnerability could allow an attacker (who needs to have Admin access privileges) to read hardcoded AES passphrase, which may be used for decryption of certain data within backup files of 2N Access Commander version 1.14 and older. 2N has released an updated version 3.3 of 2N Access Commander, where this vulnerability is mitigated. It is recommended that all customers update 2N Access Commander to the latest version. |
Thu, 06 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 06 Feb 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Successful exploitation of this vulnerability could allow an attacker (who needs to have Admin access privileges) to read hardcoded AES passphrase, which may be used for decryption of certain data within backup files of 2N Access Commander version 1.14 and older. | |
Weaknesses | CWE-321 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Axis
Published:
Updated: 2025-02-21T12:19:43.180Z
Reserved: 2024-09-23T16:37:50.255Z
Link: CVE-2024-47256

Updated: 2025-02-06T20:20:57.424Z

Status : Awaiting Analysis
Published: 2025-02-06T20:15:39.533
Modified: 2025-02-21T13:15:11.207
Link: CVE-2024-47256

No data.