CVE-2026-2627

7.8 HIGH

📋 TL;DR

This vulnerability in Softland FBackup allows local attackers to exploit a link following weakness (CWE-59) in the HID.dll library during backup/restore operations. Attackers could potentially escalate privileges or manipulate file operations. Only users running FBackup up to version 9.9 on Windows systems are affected.

💻 Affected Systems

Products:
  • Softland FBackup
Versions: Up to and including version 9.9
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the vulnerable HID.dll library path and backup/restore functionality to be used.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation allowing attackers to gain SYSTEM-level access, install malware, or compromise the entire system.

🟠

Likely Case

Local attackers could manipulate backup/restore operations to access or modify sensitive files they shouldn't have access to.

🟢

If Mitigated

With proper user access controls and limited local user privileges, impact would be restricted to the compromised user's permissions.

🌐 Internet-Facing: LOW - Attack requires local access to the system.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this, but requires specific backup/restore operations.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access and knowledge of the vulnerability. Public PoC available on GitHub.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available - vendor did not respond to disclosure

Restart Required: No

Instructions:

No official patch available. Consider upgrading to any version above 9.9 if available, or discontinue use of vulnerable versions.

🔧 Temporary Workarounds

Restrict local user privileges

windows

Limit local user accounts to prevent exploitation of the vulnerability

Remove vulnerable DLL permissions

windows

Modify permissions on HID.dll to prevent unauthorized access

icacls "C:\Program Files\Common Files\microsoft shared\ink\HID.dll" /deny Everyone:(F)

🧯 If You Can't Patch

  • Disable or uninstall FBackup versions 9.9 and below
  • Implement strict access controls and monitor for suspicious backup/restore activities

🔍 How to Verify

Check if Vulnerable:

Check FBackup version in Help > About. If version is 9.9 or below, system is vulnerable.

Check Version:

Check FBackup GUI or registry: HKEY_LOCAL_MACHINE\SOFTWARE\Softland\FBackup\Version

Verify Fix Applied:

Verify FBackup version is above 9.9, or confirm the software is uninstalled/disabled.

📡 Detection & Monitoring

Log Indicators:

  • Unusual backup/restore operations by non-admin users
  • Access attempts to HID.dll from unexpected processes

Network Indicators:

  • Local file system access patterns during backup operations

SIEM Query:

Process creation where parent process contains 'fbackup' and child process accesses sensitive system paths

🔗 References

📤 Share & Export