FKIE_CVE-2026-1568
Vulnerability from fkie_nvd - Published: 2026-02-03 17:15 - Updated: 2026-04-15 00:35
Severity ?
Summary
Rapid7 InsightVM versions before 8.34.0 contain a signature verification issue on the Assertion Consumer Service (ACS) cloud endpoint that could allow an attacker to gain unauthorized access to InsightVM accounts setup
via "Security Console" installations, resulting in full account takeover. The issue occurs due to the application processing these unsigned assertions and issuing session cookies that granted access to the
targeted user accounts. This has been fixed in version 8.34.0 of InsightVM.
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rapid7 InsightVM versions before\u00a08.34.0 contain a signature verification issue on the\u00a0Assertion Consumer Service (ACS) cloud endpoint that could allow an attacker to gain unauthorized access to InsightVM accounts setup\nvia \"Security Console\" installations, resulting in full account takeover. The issue occurs due to the application processing these unsigned assertions and issuing session cookies that granted access to the\ntargeted user accounts. This has been fixed in version 8.34.0 of InsightVM."
},
{
"lang": "es",
"value": "Las versiones de Rapid7 InsightVM anteriores a la 8.34.0 contienen un problema de verificaci\u00f3n de firma en el endpoint en la nube del Servicio de Consumidor de Aserciones (ACS) que podr\u00eda permitir a un atacante obtener acceso no autorizado a cuentas de InsightVM configuradas a trav\u00e9s de instalaciones de \u0027Security Console\u0027, lo que resulta en una toma de control total de la cuenta. El problema ocurre debido a que la aplicaci\u00f3n procesa estas aserciones sin firmar y emite cookies de sesi\u00f3n que otorgaban acceso a las cuentas de usuario objetivo. Esto ha sido corregido en la versi\u00f3n 8.34.0 de InsightVM."
}
],
"id": "CVE-2026-1568",
"lastModified": "2026-04-15T00:35:42.020",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.1,
"impactScore": 5.8,
"source": "cve@rapid7.com",
"type": "Secondary"
}
]
},
"published": "2026-02-03T17:15:59.893",
"references": [
{
"source": "cve@rapid7.com",
"url": "https://docs.rapid7.com/insight/command-platform-release-notes/"
}
],
"sourceIdentifier": "cve@rapid7.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
},
{
"lang": "en",
"value": "CWE-347"
}
],
"source": "cve@rapid7.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…