Cyber Posture

CVE-2026-2713

High

Published: 10 March 2026

Published
10 March 2026
Modified
02 April 2026
KEV Added
Patch
CVSS Score 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 1.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-2713 is a high-severity Uncontrolled Search Path Element (CWE-427) vulnerability in Ibm Trusteer Rapport. Its CVSS base score is 7.4 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique DLL Side-Loading (T1574.002); ranked at the 1.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to DLL Side-Loading (T1574.002).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1574.002 DLL Side-Loading Stealth
Adversaries may execute their own malicious payloads by side-loading DLLs.
Why these techniques?

CVE describes a CWE-427 uncontrolled DLL search path in the installer that is directly exploited by placing a malicious DLL for side-loading, enabling local arbitrary code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

IBM Trusteer Rapport installer 3.5.2309.290 IBM Trusteer Rapport could allow a local attacker to execute arbitrary code on the system, caused by DLL uncontrolled search path element vulnerability. By placing a specially crafted file in a compromised folder, an attacker…

more

could exploit this vulnerability to execute arbitrary code on the system.

Deeper analysisAI

CVE-2026-2713 is a DLL uncontrolled search path element vulnerability (CWE-427) affecting the IBM Trusteer Rapport installer version 3.5.2309.290. Published on 2026-03-10, this flaw in IBM Trusteer Rapport enables a local attacker to execute arbitrary code on the system due to improper handling of DLL loading paths.

A local attacker with no privileges (PR:N) can exploit this vulnerability by placing a specially crafted file in a compromised folder that the installer searches during execution. Exploitation requires local access (AV:L) and high attack complexity (AC:H) with no user interaction (UI:N), potentially achieving high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) via arbitrary code execution, as scored at CVSS 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).

Mitigation details are available in the IBM security advisory at https://www.ibm.com/support/pages/node/7263031.

Details

CWE(s)

Affected Products

ibm
trusteer rapport
3.5.2309.290

CVEs Like This One

CVE-2025-21127Same product: Apple Macos
CVE-2025-57836Same product: Microsoft Windows
CVE-2024-55543Same product: Microsoft Windows
CVE-2024-55540Same product: Microsoft Windows
CVE-2025-33229Same product: Microsoft Windows
CVE-2026-32172Same vendor: Microsoft
CVE-2025-21206Same vendor: Microsoft
CVE-2024-55898Same vendor: Ibm
CVE-2026-5397Shared CWE-427
CVE-2024-57963Shared CWE-427

References