CVE-2026-5310
LOW
2,0
Source: [email protected]
Attack Vector: local
Attack Complexity: high
Privileges Required: low
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
LOW
2,5
Source: [email protected]
Attack Vector: local
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: none
Availability: none
LOW
1,0
Source: [email protected]
Access Vector: local
Access Complexity: high
Authentication: single
Confidentiality: partial
Integrity: none
Availability: none
Description
AI Translation Available
A vulnerability was identified in Enter Software Iperius Backup up to 8.7.2. This impacts an unknown function of the file IperiusAccounts.ini. Such manipulation leads to use of hard-coded cryptographic key
. The attack must be carried out locally. This attack is characterized by high complexity. The exploitability is said to be difficult. The exploit is publicly available and might be used. Upgrading to version 8.7.4 will fix this issue. It is suggested to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
321
Use of Hard-coded Cryptographic Key
DraftCommon Consequences
Security Scopes Affected:
Access Control
Potential Impacts:
Bypass Protection Mechanism
Gain Privileges Or Assume Identity
Read Application Data
Applicable Platforms
Technologies:
ICS/OT
https://github.com/VulnaraByte/iperius-backup-security-advisories
https://github.com/VulnaraByte/iperius-backup-security-advisories/blob/main/poc…
https://vuldb.com/submit/778602
https://vuldb.com/vuln/354639
https://vuldb.com/vuln/354639/cti
https://www.iperiusbackup.com/download-software-backup.aspx