Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-47253: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in 2N 2N Access Commander

0
High
VulnerabilityCVE-2024-47253cvecve-2024-47253cwe-22
Published: Tue Nov 05 2024 (11/05/2024, 09:08:56 UTC)
Source: CVE Database V5
Vendor/Project: 2N
Product: 2N Access Commander

Description

In 2N Access Commander versions 3.1.1.2 and prior, a Path Traversal vulnerability could allow an attacker with administrative privileges to write files on the filesystem and potentially achieve arbitrary remote code execution. This vulnerability cannot be exploited by users with lower privilege roles.

AI-Powered Analysis

AILast updated: 01/09/2026, 14:13:58 UTC

Technical Analysis

CVE-2024-47253 is a path traversal vulnerability identified in 2N Access Commander, a widely used access control management system. The flaw exists in versions up to 3.1.1.2 and allows an attacker who already has administrative privileges to bypass pathname restrictions and write arbitrary files anywhere on the filesystem. This improper limitation of pathname inputs (CWE-22) can be exploited to place malicious files that may lead to arbitrary remote code execution, compromising the system's confidentiality, integrity, and availability. The vulnerability does not affect users with lower privilege roles, limiting the attack surface to administrators or similarly privileged users. The CVSS v3.1 score of 7.2 indicates a high-severity issue with network attack vector, low attack complexity, and no user interaction required. Although no known exploits are currently in the wild, the potential for severe impact is significant, especially in environments where 2N Access Commander controls physical access and security policies. The vulnerability highlights the importance of secure input validation and strict privilege management in access control systems.

Potential Impact

For European organizations, the impact of CVE-2024-47253 can be substantial. Organizations relying on 2N Access Commander for physical access control, such as government buildings, critical infrastructure, healthcare facilities, and corporate campuses, face risks of unauthorized system manipulation and potential full compromise. An attacker exploiting this vulnerability could deploy malicious code, disrupt access control operations, or exfiltrate sensitive data. This could lead to physical security breaches, operational downtime, and regulatory non-compliance under GDPR and other data protection laws. The requirement for administrative privileges reduces the likelihood of widespread exploitation but elevates the risk if insider threats or compromised admin accounts exist. The vulnerability could also be leveraged as a pivot point for broader network intrusion within European enterprises, amplifying the threat landscape.

Mitigation Recommendations

Immediate mitigation steps include restricting administrative access to trusted personnel and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) for all admin accounts. Organizations should monitor administrative activities and audit logs for suspicious behavior indicative of exploitation attempts. Since no patch links are currently available, organizations must engage with 2N support for updates or workarounds. Network segmentation should isolate the 2N Access Commander system from less trusted network zones to limit exposure. Implementing application whitelisting and endpoint detection and response (EDR) solutions can help detect anomalous file writes or code execution attempts. Once a patch is released, prompt application of updates is critical. Additionally, conducting regular security assessments and penetration testing focused on access control systems will help identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Axis
Date Reserved
2024-09-23T16:37:50.255Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696109bd7a8fb5c58f6e7c31

Added to database: 1/9/2026, 1:59:25 PM

Last enriched: 1/9/2026, 2:13:58 PM

Last updated: 1/10/2026, 3:11:50 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats