rakuten CVE Vulnerabilities & Metrics

Focus on rakuten vulnerabilities and metrics.

Last updated: 25 Nov 2025, 23:25 UTC

About rakuten Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with rakuten. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total rakuten CVEs: 10
Earliest CVE date: 03 Jun 2019, 01:29 UTC
Latest CVE date: 12 Sep 2025, 15:15 UTC

Latest CVE reference: CVE-2025-55996

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical rakuten CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.4

Max CVSS: 9.3

Critical CVEs (≥9): 2

CVSS Range vs. Count

Range Count
0.0-3.9 3
4.0-6.9 5
7.0-8.9 0
9.0-10.0 2

CVSS Distribution Chart

Top 5 Highest CVSS rakuten CVEs

These are the five CVEs with the highest CVSS scores for rakuten, sorted by severity first and recency.

All CVEs for rakuten

CVE-2025-55996 rakuten vulnerability CVSS: 0 12 Sep 2025, 15:15 UTC

Viber Desktop 25.6.0 is vulnerable to HTML Injection via the text parameter of the message compose/forward interface

CVE-2023-40282 rakuten vulnerability CVSS: 0 23 Aug 2023, 04:15 UTC

Improper authentication vulnerability in Rakuten WiFi Pocket all versions allows a network-adjacent attacker to log in to the product's Management Screen. As a result, sensitive information may be obtained and/or the settings may be changed.

CVE-2022-29525 rakuten vulnerability CVSS: 5.0 13 Jun 2022, 05:15 UTC

Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 uses a hard-coded credential which may allow a remote unauthenticated attacker to log in with the root privilege and perform an arbitrary operation.

CVE-2022-28704 rakuten vulnerability CVSS: 9.0 13 Jun 2022, 05:15 UTC

Improper access control vulnerability in Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 allows a remote attacker to log in with the root privilege and perform an arbitrary operation if the product is in its default settings in which is set to accept SSH connections from the WAN side, and is also connected to the Internet with the authentication information unchanged from the default settings.

CVE-2022-26834 rakuten vulnerability CVSS: 5.0 13 Jun 2022, 05:15 UTC

Improper access control vulnerability in Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 allows a remote attacker to obtain the information stored in the product because the product is set to accept HTTP connections from the WAN side by default.

CVE-2020-14049 rakuten vulnerability CVSS: 5.0 22 Jun 2020, 18:15 UTC

Viber for Windows up to 13.2.0.39 does not properly quote its custom URI handler. A malicious website could launch Viber with arbitrary parameters, forcing a victim to send an NTLM authentication request, and either relay the request or capture the hash for offline password cracking. NOTE: this issue exists because of an incomplete fix for CVE-2019-12569.

CVE-2018-3987 rakuten vulnerability CVSS: 2.1 13 Feb 2020, 00:15 UTC

An exploitable information disclosure vulnerability exists in the 'Secret Chats' functionality of Rakuten Viber on Android 9.3.0.6. The 'Secret Chats' functionality allows a user to delete all traces of a chat either by using a time trigger or by direct request. There is a bug in this functionality which leaves behind photos taken and shared on the secret chats, even after the chats are deleted. These photos will be stored in the device and accessible to all applications installed on the Android device.

CVE-2019-6024 rakuten vulnerability CVSS: 4.3 26 Dec 2019, 16:15 UTC

Rakuma App for Android version 7.15.0 and earlier, and for iOS version 7.16.4 and earlier allows an attacker to bypass authentication and obtain the user's authentication information via a malicious application created by the third party.

CVE-2019-18800 rakuten vulnerability CVSS: 4.3 06 Nov 2019, 16:15 UTC

Viber through 11.7.0.5 allows a remote attacker who can capture a victim's internet traffic to steal their Viber account, because not all Viber protocol traffic is encrypted. TCP data packet 9 on port 4244 from the victim's device contains cleartext information such as the device model and OS version, IMSI, and 20 bytes of udid in a binary format, which is located at offset 0x14 of this packet. Then, the attacker installs Viber on his device, initiates the registration process for any phone number, but doesn't enter a pin from SMS. Instead, he closes Viber. Next, the attacker rewrites his udid with the victim's udid, modifying the viber_udid file, which is located in the Viber preferences folder. (The udid is stored in a hexadecimal format.) Finally, the attacker starts Viber again and enters the pin from SMS.

CVE-2019-12569 rakuten vulnerability CVSS: 9.3 03 Jun 2019, 01:29 UTC

A vulnerability in Viber before 10.7.0 for Desktop (Windows) could allow an attacker to execute arbitrary commands on a targeted system. This vulnerability is due to unsafe search paths used by the application URI. An attacker could exploit this vulnerability by convincing a targeted user to follow a malicious link. Successful exploitation could cause the application to load libraries from the directory targeted by the URI link. The attacker could use this behavior to execute arbitrary commands on the system with the privileges of the targeted user, if the attacker can place a crafted library in a directory that is accessible to the vulnerable system.