{"api_version":"1","generated_at":"2026-04-22T16:06:30+00:00","cve":"CVE-2026-2713","urls":{"html":"https://cve.report/CVE-2026-2713","api":"https://cve.report/api/cve/CVE-2026-2713.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-2713","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-2713"},"summary":{"title":"IBM Trusteer Rapport installer affected by uncontrolled search path element vulnerability","description":"IBM Trusteer Rapport installer 3.5.2309.290 IBM Trusteer Rapport could allow a local attacker to execute arbitrary code on the system, caused by DLL uncontrolled search path element vulnerability. By placing a specially crafted file in a compromised folder, an attacker could exploit this vulnerability to execute arbitrary code on the system.","state":"PUBLISHED","assigner":"ibm","published_at":"2026-03-10 20:16:39","updated_at":"2026-04-02 13:13:36"},"problem_types":["CWE-427","CWE-427 CWE-427 Uncontrolled Search Path Element"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"7.8","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"psirt@us.ibm.com","type":"Secondary","score":"7.4","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"7.4","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.4,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://www.ibm.com/support/pages/node/7263031","name":"https://www.ibm.com/support/pages/node/7263031","refsource":"psirt@us.ibm.com","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-2713","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2713","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"IBM","product":"Trusteer Rapport installer","version":"affected 3.5.2309.290","platforms":[]}],"timeline":[],"solutions":[{"source":"CNA","title":"","value":"IBM has addressed this vulnerability and released an updated installer. The updated IBM Trusteer Rapport installer (version 3.5.2504.127) has been deployed to all public download links.\n\nFor the latest version of IBM Trusteer Rapport, please visit the official IBM Rapport download page (at:  https://trusteer.my.salesforce-sites.com/rapportinstallation/ ).\n\nImportant Notes:\n\n  *  There is NO need for existing IBM Trusteer Rapport users to update their installed product\n  *  The vulnerability affects only the installer, not the Rapport product itself\n  *  All public IBM links now point to the updated, secure installer","time":"","lang":"en"}],"workarounds":[{"source":"CNA","title":"","value":"Workarounds and Mitigations No workarounds are required as the Rapport installer has been replaced on all IBM public download links. Users downloading the installer from official IBM sources will automatically receive the secure version.","time":"","lang":"en"}],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"2713","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"2713","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"trusteer_rapport","cpe6":"3.5.2309.290","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"2713","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"2713","cve":"CVE-2026-2713","epss":"0.000150000","percentile":"0.028110000","score_date":"2026-04-07","updated_at":"2026-04-08 00:03:40"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-2713","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2026-03-10T20:08:48.598663Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-03-10T20:12:40.191Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"cpes":["cpe:2.3:a:ibm:trusteer_rapport_installer:3.5.2309.290:*:*:*:*:*:*:*"],"product":"Trusteer Rapport installer","vendor":"IBM","versions":[{"status":"affected","version":"3.5.2309.290"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>IBM Trusteer Rapport installer 3.5.2309.290 IBM Trusteer Rapport could allow a local attacker to execute arbitrary code on the system, caused by DLL uncontrolled search path element vulnerability. By placing a specially crafted file in a compromised folder, an attacker could exploit this vulnerability to execute arbitrary code on the system.</p>"}],"value":"IBM Trusteer Rapport installer 3.5.2309.290 IBM Trusteer Rapport could allow a local attacker to execute arbitrary code on the system, caused by DLL uncontrolled search path element vulnerability. By placing a specially crafted file in a compromised folder, an attacker could exploit this vulnerability to execute arbitrary code on the system."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.4,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-427","description":"CWE-427 Uncontrolled Search Path Element","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-03-10T19:53:44.012Z","orgId":"9a959283-ebb5-44b6-b705-dcc2bbced522","shortName":"ibm"},"references":[{"tags":["vendor-advisory","patch"],"url":"https://www.ibm.com/support/pages/node/7263031"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>IBM has addressed this vulnerability and released an updated installer. The updated IBM Trusteer Rapport installer (version 3.5.2504.127) has been deployed to all public download links.</p><p>For the latest version of IBM Trusteer Rapport, please visit the official IBM Rapport download page (at:&nbsp;<a href=\"https://trusteer.my.salesforce-sites.com/rapportinstallation/\" rel=\"nofollow\">https://trusteer.my.salesforce-sites.com/rapportinstallation/</a>).</p><p>Important Notes:</p><ul><li>There is NO need for existing IBM Trusteer Rapport users to update their installed product</li><li>The vulnerability affects only the installer, not the Rapport product itself</li><li>All public IBM links now point to the updated, secure installer</li></ul>"}],"value":"IBM has addressed this vulnerability and released an updated installer. The updated IBM Trusteer Rapport installer (version 3.5.2504.127) has been deployed to all public download links.\n\nFor the latest version of IBM Trusteer Rapport, please visit the official IBM Rapport download page (at:  https://trusteer.my.salesforce-sites.com/rapportinstallation/ ).\n\nImportant Notes:\n\n  *  There is NO need for existing IBM Trusteer Rapport users to update their installed product\n  *  The vulnerability affects only the installer, not the Rapport product itself\n  *  All public IBM links now point to the updated, secure installer"}],"title":"IBM Trusteer Rapport installer affected by uncontrolled search path element vulnerability","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Workarounds and Mitigations No workarounds are required as the Rapport installer has been replaced on all IBM public download links. Users downloading the installer from official IBM sources will automatically receive the secure version.</p>"}],"value":"Workarounds and Mitigations No workarounds are required as the Rapport installer has been replaced on all IBM public download links. Users downloading the installer from official IBM sources will automatically receive the secure version."}],"x_generator":{"engine":"ibm-cvegen"}}},"cveMetadata":{"assignerOrgId":"9a959283-ebb5-44b6-b705-dcc2bbced522","assignerShortName":"ibm","cveId":"CVE-2026-2713","datePublished":"2026-03-10T19:53:44.012Z","dateReserved":"2026-02-18T20:34:31.033Z","dateUpdated":"2026-03-10T20:12:40.191Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-10 20:16:39","lastModifiedDate":"2026-04-02 13:13:36","problem_types":["CWE-427","CWE-427 CWE-427 Uncontrolled Search Path Element"],"metrics":{"cvssMetricV31":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.4,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:trusteer_rapport:3.5.2309.290:*:*:*:*:*:*:*","matchCriteriaId":"471113FB-3A15-4E76-AEFF-A4FEF93F3C8F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","matchCriteriaId":"387021A0-AF36-463C-A605-32EA7DAC172E"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","matchCriteriaId":"A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"2713","Ordinal":"1","Title":"IBM Trusteer Rapport installer affected by uncontrolled search p","CVE":"CVE-2026-2713","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"2713","Ordinal":"1","NoteData":"IBM Trusteer Rapport installer 3.5.2309.290 IBM Trusteer Rapport could allow a local attacker to execute arbitrary code on the system, caused by DLL uncontrolled search path element vulnerability. By placing a specially crafted file in a compromised folder, an attacker could exploit this vulnerability to execute arbitrary code on the system.","Type":"Description","Title":"IBM Trusteer Rapport installer affected by uncontrolled search p"}]}}}