CVE-2026-5310

Published: Apr 01, 2026 Last Modified: Apr 01, 2026
ExploitDB:
Other exploit source:
Google Dorks:
LOW 2,0
Attack Vector: local
Attack Complexity: high
Privileges Required: low
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
LOW 2,5
Attack Vector: local
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: none
Availability: none
LOW 1,0
Access Vector: local
Access Complexity: high
Authentication: single
Confidentiality: partial
Integrity: none
Availability: none

Description

AI Translation Available

A vulnerability was identified in Enter Software Iperius Backup up to 8.7.2. This impacts an unknown function of the file IperiusAccounts.ini. Such manipulation leads to use of hard-coded cryptographic key
. The attack must be carried out locally. This attack is characterized by high complexity. The exploitability is said to be difficult. The exploit is publicly available and might be used. Upgrading to version 8.7.4 will fix this issue. It is suggested to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

321

Use of Hard-coded Cryptographic Key

Draft
Common Consequences
Security Scopes Affected:
Access Control
Potential Impacts:
Bypass Protection Mechanism Gain Privileges Or Assume Identity Read Application Data
Applicable Platforms
Technologies: ICS/OT
View CWE Details
https://github.com/VulnaraByte/iperius-backup-security-advisories
https://github.com/VulnaraByte/iperius-backup-security-advisories/blob/main/poc…
https://vuldb.com/submit/778602
https://vuldb.com/vuln/354639
https://vuldb.com/vuln/354639/cti
https://www.iperiusbackup.com/download-software-backup.aspx