Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2627: Link Following in Softland FBackup

0
High
VulnerabilityCVE-2026-2627cvecve-2026-2627
Published: Tue Feb 17 2026 (02/17/2026, 21:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Softland
Product: FBackup

Description

A security flaw has been discovered in Softland FBackup up to 9.9. This impacts an unknown function in the library C:\Program Files\Common Files\microsoft shared\ink\HID.dll of the component Backup/Restore. The manipulation results in link following. The attack needs to be approached locally. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 23:22:18 UTC

Technical Analysis

CVE-2026-2627 is a vulnerability identified in Softland FBackup software versions 9.0 through 9.9, specifically within a component responsible for backup and restore operations. The flaw is rooted in an unsafe link following behavior in the HID.dll library located at C:\Program Files\Common Files\microsoft shared\ink\HID.dll. This library is part of the Microsoft shared ink components but is utilized by FBackup in its backup/restore functionality. The vulnerability allows an attacker with local access and low privileges (PR:L) to manipulate symbolic or hard links, potentially redirecting backup or restore operations to unintended locations. This can lead to unauthorized access, modification, or deletion of backup data, impacting confidentiality, integrity, and availability. The attack vector requires no user interaction and no elevated privileges beyond local access, making it easier to exploit in environments where local access is possible. The vendor was notified early but has not issued any patches or advisories, and the exploit code has been publicly released, increasing the risk of exploitation. The CVSS v4.0 score of 8.5 reflects the high impact on confidentiality, integrity, and availability, combined with relatively low attack complexity and no user interaction required. No known exploits in the wild have been reported yet, but the public availability of exploit code necessitates urgent attention from affected users. The vulnerability does not involve network attack vectors, limiting remote exploitation but posing a significant risk in multi-user or shared environments where local access can be gained.

Potential Impact

The vulnerability poses a significant risk to organizations relying on Softland FBackup for critical backup and restore operations. Exploitation can lead to unauthorized disclosure, modification, or destruction of backup data, undermining data integrity and availability. This can result in data loss, disruption of business continuity, and potential exposure of sensitive information. Since backups are often the last line of defense against ransomware and data corruption, compromising backup integrity can severely impact incident recovery efforts. The local attack requirement limits remote exploitation but does not eliminate risk in environments with multiple users, shared workstations, or where attackers can gain local access through other means (e.g., phishing, insider threats). The lack of vendor response and absence of patches increases the window of exposure. Organizations may face compliance and regulatory risks if backup data confidentiality or integrity is compromised. Overall, the vulnerability threatens the reliability of backup processes, which are critical for organizational resilience.

Mitigation Recommendations

Given the absence of official patches, organizations should implement immediate compensating controls. These include restricting local access to systems running Softland FBackup to trusted personnel only, enforcing strict access controls and user permissions to limit who can execute or modify backup operations. Employ application whitelisting and endpoint protection solutions to detect and prevent exploitation attempts involving link manipulation. Regularly audit and monitor backup directories and related file system objects for unauthorized symbolic or hard links. Consider isolating backup servers or workstations from general user environments to reduce local attack surface. If feasible, temporarily discontinue use of affected FBackup versions and migrate to alternative backup solutions until a patch is available. Maintain offline and immutable backup copies to ensure recovery capability in case of compromise. Additionally, monitor security forums and vendor channels for updates or patches addressing this vulnerability. Implementing strong physical security controls and endpoint detection and response (EDR) tools can further reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-17T13:24:38.763Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6994e1f780d747be20dad4ab

Added to database: 2/17/2026, 9:47:35 PM

Last enriched: 2/24/2026, 11:22:18 PM

Last updated: 4/3/2026, 5:58:01 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses