| Title | Enter Software Iperius Backup <= 8.7.2 Authentication Bypass by Capture-replay |
|---|
| Description | The application is vulnerable to an NetNTLMv2 relay attack, allowing an attacker to capture and relay NetNTLMv2 authentication requests from a victim to another service, potentially enabling unauthorized authentication as the victim user. |
|---|
| Source | ⚠️ https://github.com/0truust/iperius-backup-security-advisories/blob/main/advisories/ntlm-relay-credential-exposure.md |
|---|
| User | 0truust (UID 96115) |
|---|
| Submission | 03/06/2026 20:09 (1 month ago) |
|---|
| Moderation | 03/25/2026 14:56 (19 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 353123 [Enter Software Iperius Backup up to 8.7.3 NTLM2 information disclosure] |
|---|
| Points | 16 |
|---|