Enter Software Iperius Backup Backup Job Configuration File privileges management
Summary
| CVE | CVE-2026-4824 |
|---|---|
| State | PUBLISHED |
| Assigner | VulDB |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-03-25 22:16:19 UTC |
| Updated | 2026-03-30 13:26:50 UTC |
| Description | A vulnerability has been found in Enter Software Iperius Backup up to 8.7.3. Affected by this issue is some unknown functionality of the component Backup Job Configuration File Handler. The manipulation leads to improper privilege management. The attack must be carried out locally. The attack is considered to have high complexity. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 8.7.4 can resolve this issue. It is advisable to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
Risk And Classification
Primary CVSS: v4.0 7.3 HIGH from [email protected]
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
EPSS: 0.000120000 probability, percentile 0.014440000 (date 2026-04-01)
Problem Types: CWE-266 | CWE-269 | CWE-269 Improper Privilege Management | CWE-266 Incorrect Privilege Assignment
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 4.0 | [email protected] | Secondary | 7.3 | HIGH | CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/C... |
| 4.0 | CNA | DECLARED | 7.3 | HIGH | CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P |
| 3.1 | [email protected] | Primary | 7 | HIGH | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | CNA | DECLARED | 7 | HIGH | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
| 3.0 | CNA | DECLARED | 7 | HIGH | CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
| 2.0 | [email protected] | Secondary | 6 | AV:L/AC:H/Au:S/C:C/I:C/A:C | |
| 2.0 | CNA | DECLARED | 6 | AV:L/AC:H/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C |
CVSS v4.0 Breakdown
Attack Vector
LocalAttack Complexity
HighAttack Requirements
NonePrivileges Required
LowUser Interaction
NoneConfidentiality
HighIntegrity
HighAvailability
HighSub Conf.
NoneSub Integrity
NoneSub Availability
NoneCVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
HighPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v3.0 Breakdown
Attack Vector
LocalAttack Complexity
HighPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Enter Software | Iperius Backup | affected 8.7.0 | Not specified |
| CNA | Enter Software | Iperius Backup | affected 8.7.1 | Not specified |
| CNA | Enter Software | Iperius Backup | affected 8.7.2 | Not specified |
| CNA | Enter Software | Iperius Backup | affected 8.7.3 | Not specified |
| CNA | Enter Software | Iperius Backup | unaffected 8.7.4 | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| github.com/0truust/iperius-backup-security-advisories/blob/main/advisori... | [email protected] | github.com | |
| vuldb.com | [email protected] | vuldb.com | |
| vuldb.com | [email protected] | vuldb.com | |
| vuldb.com | [email protected] | vuldb.com | |
| www.iperiusbackup.com/download-software-backup.aspx | [email protected] | www.iperiusbackup.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: 0truust (VulDB User) (en)
CNA: VulDB (en)
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2026-03-25T00:00:00.000Z | Advisory disclosed |
| CNA | 2026-03-25T01:00:00.000Z | VulDB entry created |
| CNA | 2026-03-25T15:01:51.000Z | VulDB entry last update |
There are currently no legacy QID mappings associated with this CVE.