On 2N Access Unit 2.0 2.31.0.40.5 devices, an attacker can pose as the web relay for a man-in-the-middle attack.
5.9CVSS
5.7AI Score
0.001EPSS
In 2N Access Commander versions 3.1.1.2 and prior, a Path Traversal vulnerability could allow an attacker with administrative privileges to write files on the filesystem and potentially achieve arbitrary remote code execution. This vulnerability cannot be exploited by users with lower privilege rol...
7.2CVSS
7.4AI Score
0.0005EPSS
In 2N Access Commander versions 3.1.1.2 and prior, an InsufficientVerification of Data Authenticity vulnerability could allow an attackerto escalate their privileges and gain root access to the system.
7.2CVSS
7.5AI Score
0.001EPSS
In 2N Access Commander versions 3.1.1.2 and prior, a local attacker can escalate their privileges in the system which could allow for arbitrarycode execution with root permissions.
7.8CVSS
7.5AI Score
0.0004EPSS