CVE-2026-2713

7.4 HIGH

📋 TL;DR

This vulnerability in IBM Trusteer Rapport installer 3.5.2309.290 allows a local attacker to execute arbitrary code via DLL hijacking. Attackers can place malicious DLLs in compromised folders to exploit the uncontrolled search path. Only systems with this specific IBM Trusteer Rapport version are affected.

💻 Affected Systems

Products:
  • IBM Trusteer Rapport
Versions: 3.5.2309.290
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific installer version mentioned; requires local access to place malicious DLLs in vulnerable directories.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining SYSTEM/administrator privileges, installing persistent malware, stealing credentials, and pivoting to other systems.

🟠

Likely Case

Local privilege escalation leading to data theft, malware installation, or lateral movement within the network.

🟢

If Mitigated

Limited impact due to proper access controls preventing local attackers from writing to vulnerable directories.

🌐 Internet-Facing: LOW - This requires local access to the system, not remote exploitation.
🏢 Internal Only: HIGH - Insider threats or compromised user accounts can exploit this for privilege escalation within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to write to specific directories; typical DLL hijacking technique.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version as per IBM advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/7263031

Restart Required: Yes

Instructions:

1. Visit IBM Trusteer Rapport download page. 2. Download latest installer. 3. Run installer to update. 4. Restart system if prompted.

🔧 Temporary Workarounds

Restrict directory permissions

windows

Set strict ACLs on directories where Trusteer Rapport runs to prevent unauthorized DLL placement

icacls "C:\Program Files\IBM\Trusteer Rapport" /deny Everyone:(OI)(CI)(W)

Enable Safe DLL search mode

windows

Configure Windows to search system directories first before current directory

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v SafeDllSearchMode /t REG_DWORD /d 1 /f

🧯 If You Can't Patch

  • Implement strict access controls to prevent local users from writing to application directories
  • Monitor for suspicious DLL loading events using Windows Event Logs

🔍 How to Verify

Check if Vulnerable:

Check installed version of IBM Trusteer Rapport via Control Panel > Programs and Features

Check Version:

wmic product where name="IBM Trusteer Rapport" get version

Verify Fix Applied:

Verify version is updated beyond 3.5.2309.290 and check for successful installation logs

📡 Detection & Monitoring

Log Indicators:

  • Windows Event ID 4688 (process creation) showing Trusteer Rapport loading DLLs from unusual locations
  • Sysmon Event ID 7 (image loaded) with suspicious DLL paths

Network Indicators:

  • Unusual outbound connections from Trusteer Rapport process post-exploitation

SIEM Query:

source="windows" AND (event_id=4688 OR event_id=7) AND process_name="*rapport*" AND image_loaded="*.dll" AND NOT image_loaded="*system32*"

🔗 References

📤 Share & Export