Description
A vulnerability was identified in Enter Software Iperius Backup up to 8.7.2. This impacts an unknown function of the file IperiusAccounts.ini. Such manipulation leads to use of hard-coded cryptographic key
. The attack must be carried out locally. This attack is characterized by high complexity. The exploitability is said to be difficult. The exploit is publicly available and might be used. Upgrading to version 8.7.4 will fix this issue. It is suggested to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Published: 2026-04-01
Score: 2 Low
EPSS: < 1% Very Low
KEV: No
Impact: Credential compromise via hard‑coded cryptographic key
Action: Patch Now
AI Analysis

Impact

Enter Software Iperius Backup stores a cryptographic key in the IperiusAccounts.ini file in a hard‑coded form. Manipulation of an unknown function of this file causes the application to use the fixed key, enabling an attacker to decrypt stored account credentials. This flaw is a classic example of insecure handling of cryptographic material, documented as CWE‑320 and CWE‑321.

Affected Systems

All releases of Enter Software Iperius Backup up to and including version 8.7.2 are affected. The vendor has released a fixed version, 8.7.4, which removes the hard‑coded key and secures credential storage. Systems running an earlier version should be upgraded to 8.7.4 or later.

Risk and Exploitability

The CVSS score of 2 reflects a low baseline severity, yet the vulnerability is publicly documented and exploit code is available, indicating a realistic threat for attackers who have local access. The attack requires local privileges to modify the IperiusAccounts.ini file and has a high complexity, making exploitation difficult but not impossible. The vulnerability is not recorded in the CISA KEV catalog, but the public availability of an exploit raises the likelihood of targeted or opportunistic attacks on unpatched installations.

Generated by OpenCVE AI on April 2, 2026 at 05:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Enter Software Iperius Backup to version 8.7.4 or later.

Generated by OpenCVE AI on April 2, 2026 at 05:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Enter Software
Enter Software iperius Backup
Vendors & Products Enter Software
Enter Software iperius Backup

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Enter Software Iperius Backup up to 8.7.2. This impacts an unknown function of the file IperiusAccounts.ini. Such manipulation leads to use of hard-coded cryptographic key . The attack must be carried out locally. This attack is characterized by high complexity. The exploitability is said to be difficult. The exploit is publicly available and might be used. Upgrading to version 8.7.4 will fix this issue. It is suggested to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Title Enter Software Iperius Backup IperiusAccounts.ini hard-coded key
Weaknesses CWE-320
CWE-321
References
Metrics cvssV2_0

{'score': 1, 'vector': 'AV:L/AC:H/Au:S/C:P/I:N/A:N/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 2.5, 'vector': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 2.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 2, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Enter Software Iperius Backup
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-01T17:54:16.358Z

Reserved: 2026-04-01T12:02:06.531Z

Link: CVE-2026-5310

cve-icon Vulnrichment

Updated: 2026-04-01T17:52:09.307Z

cve-icon NVD

Status : Deferred

Published: 2026-04-01T17:28:43.313

Modified: 2026-04-24T18:12:06.580

Link: CVE-2026-5310

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:17:14Z

Weaknesses