CVE-2026-4822
HIGH
7,3
Source: [email protected]
Attack Vector: local
Attack Complexity: high
Privileges Required: low
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
HIGH
7,0
Source: [email protected]
Attack Vector: local
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
MEDIUM
6,0
Source: [email protected]
Access Vector: local
Access Complexity: high
Authentication: single
Confidentiality: complete
Integrity: complete
Availability: complete
Description
AI Translation Available
A vulnerability was detected in Enter Software Iperius Backup bis 8.7.3. Affected is an unknown function of the file C:\ProgramData\IperiusBackup\Jobs\ of the component Backup Service. Performing a manipulation results in creation of temporary file with insecure permissions. The attack is only possible with local access. A high degree of complexity is needed for the attack. The exploitability is told to be difficult. The exploit is now public and may be used. Upgrading to version 8.7.4 is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
377
Insecure Temporary File
IncompleteCommon Consequences
Security Scopes Affected:
Confidentiality
Integrity
Potential Impacts:
Read Files Or Directories
Modify Files Or Directories
Applicable Platforms
All platforms may be affected
378
Creation of Temporary File With Insecure Permissions
DraftCommon Consequences
Security Scopes Affected:
Confidentiality
Authorization
Other
Integrity
Potential Impacts:
Read Application Data
Other
Applicable Platforms
All platforms may be affected
https://github.com/0truust/iperius-backup-security-advisories/blob/main/advisor…
https://vuldb.com/?ctiid.353122
https://vuldb.com/?id.353122
https://vuldb.com/?submit.774209
https://www.iperiusbackup.com/download-software-backup.aspx