CVE-2026-5310

low

Description

A vulnerability was identified in Enter Software Iperius Backup up to 8.7.2. This impacts an unknown function of the file IperiusAccounts.ini. Such manipulation leads to use of hard-coded cryptographic key . The attack must be carried out locally. This attack is characterized by high complexity. The exploitability is said to be difficult. The exploit is publicly available and might be used. Upgrading to version 8.7.4 will fix this issue. It is suggested to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

References

https://www.iperiusbackup.com/download-software-backup.aspx

https://vuldb.com/vuln/354639/cti

https://vuldb.com/vuln/354639

https://vuldb.com/submit/778602

https://github.com/VulnaraByte/iperius-backup-security-advisories/blob/main/poc/decrypt_iperius.py

https://github.com/VulnaraByte/iperius-backup-security-advisories

Details

Source: Mitre, NVD

Published: 2026-04-01

Updated: 2026-04-01

Risk Information

CVSS v2

Base Score: 1

Vector: CVSS2#AV:L/AC:H/Au:S/C:P/I:N/A:N

Severity: Low

CVSS v3

Base Score: 2.5

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

Severity: Low

CVSS v4

Base Score: 2

Vector: CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Severity: Low