← Volver a CVEs
CVE-2026-5310
LOW2.5
Descripcion
A vulnerability was identified in Enter Software Iperius Backup up to 8.7.2. This impacts an unknown function of the file IperiusAccounts.ini. Such manipulation leads to use of hard-coded cryptographic key . The attack must be carried out locally. This attack is characterized by high complexity. The exploitability is said to be difficult. The exploit is publicly available and might be used. Upgrading to version 8.7.4 will fix this issue. It is suggested to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Detalles CVE
Puntuacion CVSS v3.12.5
SeveridadLOW
Vector CVSSCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Vector de ataqueLOCAL
ComplejidadHIGH
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado4/1/2026
Ultima modificacion4/3/2026
Fuentenvd
Avistamientos honeypot0
Debilidades (CWE)
CWE-320CWE-321
Referencias
https://github.com/VulnaraByte/iperius-backup-security-advisories/blob/main/poc/decrypt_iperius.py(cna@vuldb.com)
https://vuldb.com/submit/778602(cna@vuldb.com)
https://vuldb.com/vuln/354639(cna@vuldb.com)
https://vuldb.com/vuln/354639/cti(cna@vuldb.com)
https://www.iperiusbackup.com/download-software-backup.aspx(cna@vuldb.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.