Iperius Backup 6.1.0 contains a privilege escalation vulnerability that allows low-privilege users to execute arbitrary programs with elevated privileges by creating backup jobs. Attackers can configure backup jobs to execute malicious batch files or programs before or after backup operations, which run with the privileges of the Iperius Backup Service account (Local System or Administrator), enabling privilege escalation and arbitrary code execution.
History

Mon, 23 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Iperius
Iperius iperius Backup
Vendors & Products Iperius
Iperius iperius Backup

Sun, 22 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description Iperius Backup 6.1.0 contains a privilege escalation vulnerability that allows low-privilege users to execute arbitrary programs with elevated privileges by creating backup jobs. Attackers can configure backup jobs to execute malicious batch files or programs before or after backup operations, which run with the privileges of the Iperius Backup Service account (Local System or Administrator), enabling privilege escalation and arbitrary code execution.
Title Iperius Backup 6.1.0 Privilege Escalation via Backup Job
Weaknesses CWE-520
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2026-03-22T13:38:42.514Z

Updated: 2026-03-23T15:30:27.448Z

Reserved: 2026-03-22T13:14:56.383Z

Link: CVE-2019-25608

cve-icon Vulnrichment

Updated: 2026-03-23T15:30:23.097Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-22T14:16:28.807

Modified: 2026-03-23T14:31:37.267

Link: CVE-2019-25608

cve-icon Redhat

No data.