IBM Trusteer Rapport installer affected by uncontrolled search path element vulnerability
Summary
| CVE | CVE-2026-2713 |
|---|---|
| State | PUBLISHED |
| Assigner | ibm |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-03-10 20:16:39 UTC |
| Updated | 2026-04-02 13:13:36 UTC |
| Description | IBM Trusteer Rapport installer 3.5.2309.290 IBM Trusteer Rapport could allow a local attacker to execute arbitrary code on the system, caused by DLL uncontrolled search path element vulnerability. By placing a specially crafted file in a compromised folder, an attacker could exploit this vulnerability to execute arbitrary code on the system. |
Risk And Classification
Primary CVSS: v3.1 7.8 HIGH from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.000190000 probability, percentile 0.049010000 (date 2026-04-02)
Problem Types: CWE-427 | CWE-427 CWE-427 Uncontrolled Search Path Element
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 7.8 | HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | [email protected] | Secondary | 7.4 | HIGH | CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | CNA | CVSS | 7.4 | HIGH | CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
CVSS v3.1 Breakdown
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
NVD Known Affected Configurations (CPE 2.3)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | IBM | Trusteer Rapport Installer | affected 3.5.2309.290 | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| www.ibm.com/support/pages/node/7263031 | [email protected] | www.ibm.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Additional Advisory Data
Solutions
CNA: IBM has addressed this vulnerability and released an updated installer. The updated IBM Trusteer Rapport installer (version 3.5.2504.127) has been deployed to all public download links. For the latest version of IBM Trusteer Rapport, please visit the official IBM Rapport download page (at: https://trusteer.my.salesforce-sites.com/rapportinstallation/ ). Important Notes: * There is NO need for existing IBM Trusteer Rapport users to update their installed product * The vulnerability affects only the installer, not the Rapport product itself * All public IBM links now point to the updated, secure installer
Workarounds
CNA: Workarounds and Mitigations No workarounds are required as the Rapport installer has been replaced on all IBM public download links. Users downloading the installer from official IBM sources will automatically receive the secure version.