Description
A flaw has been found in Enter Software Iperius Backup up to 8.7.3. Affected by this vulnerability is an unknown functionality of the component NTLM2 Handler. Executing a manipulation can lead to information disclosure. The attack is restricted to local execution. Attacks of this nature are highly complex. The exploitation appears to be difficult. The exploit has been published and may be used. Upgrading to version 8.7.4 addresses this issue. Upgrading the affected component is advised. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Published: 2026-03-25
Score: 2 Low
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch Upgrade
AI Analysis

Impact

A flaw in the NTLM2 Handler component of Iperius Backup allows an attacker with local execution privileges to read sensitive information, potentially including credential data. The vulnerability falls under information disclosure (CWE-200) and unauthorized access to resources (CWE-284). Exploitation requires complex manipulation, so the attack is not trivial, but published exploits indicate it is feasible.

Affected Systems

The affected product is Enter Software Iperius Backup. Versions up to 8.7.3 are susceptible; the issue is fixed in version 8.7.4. The attack is limited to local execution and does not provide remote access.

Risk and Exploitability

The CVSS score of 2.0 classifies the severity as low. No EPSS data is available, and the vulnerability is not listed in the CISA KEV catalog. Although the exploit requires local access and is difficult to execute, publicly disclosed proofs of concept exist, indicating that organisations running older versions could be exposed if local privilege is available. While the overall risk is low, applying the vendor‑issued fix is recommended to eliminate the disclosure path.

Generated by OpenCVE AI on March 26, 2026 at 03:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Iperius Backup to the latest version (8.7.4) that contains the fix for the NTLM2 Handler vulnerability.

Generated by OpenCVE AI on March 26, 2026 at 03:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Enter Software
Enter Software iperius Backup
Vendors & Products Enter Software
Enter Software iperius Backup

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Enter Software Iperius Backup up to 8.7.3. Affected by this vulnerability is an unknown functionality of the component NTLM2 Handler. Executing a manipulation can lead to information disclosure. The attack is restricted to local execution. Attacks of this nature are highly complex. The exploitation appears to be difficult. The exploit has been published and may be used. Upgrading to version 8.7.4 addresses this issue. Upgrading the affected component is advised. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Title Enter Software Iperius Backup NTLM2 information disclosure
Weaknesses CWE-200
CWE-284
References
Metrics cvssV2_0

{'score': 1, 'vector': 'AV:L/AC:H/Au:S/C:P/I:N/A:N/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 2.5, 'vector': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 2.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 2, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Enter Software Iperius Backup
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-26T15:01:17.506Z

Reserved: 2026-03-25T13:56:38.724Z

Link: CVE-2026-4823

cve-icon Vulnrichment

Updated: 2026-03-26T15:01:11.004Z

cve-icon NVD

Status : Deferred

Published: 2026-03-25T22:16:19.280

Modified: 2026-04-24T16:35:20.070

Link: CVE-2026-4823

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:09:27Z

Weaknesses