akeo CVE Vulnerabilities & Metrics

Focus on akeo vulnerabilities and metrics.

Last updated: 08 Mar 2026, 23:25 UTC

About akeo Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with akeo. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total akeo CVEs: 3
Earliest CVE date: 19 Jul 2019, 16:15 UTC
Latest CVE date: 22 Jan 2026, 22:16 UTC

Latest CVE reference: CVE-2026-23988

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): -100.0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): -100.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical akeo CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.77

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 1
4.0-6.9 1
7.0-8.9 1
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS akeo CVEs

These are the five CVEs with the highest CVSS scores for akeo, sorted by severity first and recency.

All CVEs for akeo

CVE-2026-23988 akeo vulnerability CVSS: 0 22 Jan 2026, 22:16 UTC

Rufus is a utility that helps format and create bootable USB flash drives. Versions 4.11 and below contain a race condition (TOCTOU) in src/net.c during the creation, validation, and execution of the Fido PowerShell script. Since Rufus runs with elevated privileges (Administrator) but writes the script to the %TEMP% directory (writeable by standard users) without locking the file, a local attacker can replace the legitimate script with a malicious one between the file write operation and the execution step. This allows arbitrary code execution with Administrator privileges. This issue has been fixed in version 4.12_BETA.

CVE-2019-1010101 akeo vulnerability CVSS: 7.5 19 Jul 2019, 16:15 UTC

Akeo Consulting Rufus 3.0 and earlier is affected by: Insecure Permissions. The impact is: arbitrary code execution with escalation of privilege. The component is: Executable installer, portable executable (ALL executables available). The attack vector is: CWE-29, CWE-377, CWE-379.

CVE-2019-1010100 akeo vulnerability CVSS: 6.8 19 Jul 2019, 16:15 UTC

Akeo Consulting Rufus 3.0 and earlier is affected by: DLL search order hijacking. The impact is: Arbitrary code execution WITH escalation of privilege. The component is: Executable installers, portable executables (ALL executables on the web site). The attack vector is: CAPEC-471, CWE-426, CWE-427.