CVE-2026-2713
Received Received - Intake
DLL Search Path Vulnerability in IBM Trusteer Rapport Enables Code Execution

Publication date: 2026-03-10

Last updated on: 2026-04-02

Assigner: IBM Corporation

Description
IBM Trusteer Rapport installer 3.5.2309.290 IBM Trusteer Rapport could allow a local attacker to execute arbitrary code on the system, caused by DLL uncontrolled search path element vulnerability. By placing a specially crafted file in a compromised folder, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-10
Last Modified
2026-04-02
Generated
2026-05-07
AI Q&A
2026-03-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ibm trusteer_rapport 3.5.2309.290
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-427 The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in IBM Trusteer Rapport installer version 3.5.2309.290 and is caused by an uncontrolled search path element for DLL files. A local attacker can exploit this by placing a specially crafted file in a compromised folder, which allows them to execute arbitrary code on the affected system.


How can this vulnerability impact me? :

The impact of this vulnerability is that a local attacker could execute arbitrary code on your system without needing user interaction or privileges. This could lead to full compromise of the system, including unauthorized access, data theft, or disruption of services.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart