Description
IBM Trusteer Rapport installer 3.5.2309.290 IBM Trusteer Rapport could allow a local attacker to execute arbitrary code on the system, caused by DLL uncontrolled search path element vulnerability. By placing a specially crafted file in a compromised folder, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Published: 2026-03-10
Score: 7.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Local code execution
Action: Apply Updated Installer
AI Analysis

Impact

IBM Trusteer Rapport installer 3.5.2309.290 contains an uncontrolled search path element flaw that allows a local attacker to drop a malicious file into a directory traversed during the installation process. By exploiting this vulnerability the attacker can run arbitrary code with the privileges of the installer, leading to full system compromise. The weakness is a classic CWE‑427: Uncontrolled Search Path Element. The impact is limited to local systems that run the installer, and does not affect an already‑installed Rapport product.

Affected Systems

The vulnerability is specific to the IBM Trusteer Rapport installer version 3.5.2309.290, affecting installations on macOS and Windows platforms. Only the installer is impacted; the Rapport application itself is not vulnerable. All public download links have been updated to version 3.5.2504.127, which addresses the flaw.

Risk and Exploitability

With a CVSS score of 7.4 the flaw is considered high severity. The EPSS score is below 1%, indicating low current exploitation probability, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The attack vector is local, requiring the attacker to have access to the target machine to place a crafted file in the search path directory during installation.

Generated by OpenCVE AI on April 16, 2026 at 03:28 UTC.

Remediation

Vendor Solution

IBM has addressed this vulnerability and released an updated installer. The updated IBM Trusteer Rapport installer (version 3.5.2504.127) has been deployed to all public download links. For the latest version of IBM Trusteer Rapport, please visit the official IBM Rapport download page (at:  https://trusteer.my.salesforce-sites.com/rapportinstallation/ ). Important Notes: * There is NO need for existing IBM Trusteer Rapport users to update their installed product * The vulnerability affects only the installer, not the Rapport product itself * All public IBM links now point to the updated, secure installer


Vendor Workaround

Workarounds and Mitigations No workarounds are required as the Rapport installer has been replaced on all IBM public download links. Users downloading the installer from official IBM sources will automatically receive the secure version.


OpenCVE Recommended Actions

  • Download and install the updated IBM Trusteer Rapport installer (version 3.5.2504.127) from the official IBM Rapport download page (https://trusteer.my.salesforce-sites.com/rapportinstallation/).
  • Verify that all system download links and scripts point to the new installer image; replace any hard‑coded references to the old installer with the updated version.
  • If any old installer binaries still exist on the system, delete them to prevent accidental use of the vulnerable package.

Generated by OpenCVE AI on April 16, 2026 at 03:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Ibm trusteer Rapport
Microsoft
Microsoft windows
CPEs cpe:2.3:a:ibm:trusteer_rapport:3.5.2309.290:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Ibm trusteer Rapport
Microsoft
Microsoft windows

Tue, 10 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Description IBM Trusteer Rapport installer 3.5.2309.290 IBM Trusteer Rapport could allow a local attacker to execute arbitrary code on the system, caused by DLL uncontrolled search path element vulnerability. By placing a specially crafted file in a compromised folder, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Title IBM Trusteer Rapport installer affected by uncontrolled search path element vulnerability
First Time appeared Ibm
Ibm trusteer Rapport Installer
Weaknesses CWE-427
CPEs cpe:2.3:a:ibm:trusteer_rapport_installer:3.5.2309.290:*:*:*:*:*:*:*
Vendors & Products Ibm
Ibm trusteer Rapport Installer
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Apple Macos
Ibm Trusteer Rapport Trusteer Rapport Installer
Microsoft Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: ibm

Published:

Updated: 2026-03-10T20:12:40.191Z

Reserved: 2026-02-18T20:34:31.033Z

Link: CVE-2026-2713

cve-icon Vulnrichment

Updated: 2026-03-10T20:11:52.607Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T20:16:39.930

Modified: 2026-04-02T13:13:36.953

Link: CVE-2026-2713

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T03:30:06Z

Weaknesses