{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/iperius-backup/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["critical"],"_cs_tags":["privilege escalation","cve-2019-25608","iperius backup"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eIperius Backup 6.1.0 is susceptible to a privilege escalation vulnerability (CVE-2019-25608) that enables unprivileged users to gain elevated permissions on the system. This flaw allows attackers to create and configure backup jobs to execute arbitrary code, such as batch files or executable programs, with the privileges of the Iperius Backup Service account, which typically runs as Local System or Administrator. The vulnerability stems from insufficient checks on the scripts or programs…\u003c/p\u003e\n","date_modified":"2026-03-23T15:00:00Z","date_published":"2026-03-23T15:00:00Z","id":"/briefs/2026-03-iperius-backup-privilege-escalation/","summary":"Iperius Backup 6.1.0 is vulnerable to privilege escalation, allowing low-privilege users to execute arbitrary programs with elevated privileges by creating malicious backup jobs that execute pre- or post-backup scripts with SYSTEM privileges.","title":"Iperius Backup 6.1.0 Privilege Escalation via Malicious Backup Jobs (CVE-2019-25608)","url":"https://feed.craftedsignal.io/briefs/2026-03-iperius-backup-privilege-escalation/"}],"language":"en","title":"CraftedSignal Threat Feed — Iperius Backup","version":"https://jsonfeed.org/version/1.1"}