First published: Wed Dec 07 2022(Updated: )
Rapid7 Nexpose and InsightVM versions prior to 6.6.172 failed to reliably validate the authenticity of update contents. This failure could allow an attacker to provide a malicious update and alter the functionality of Rapid7 Nexpose. The attacker would need some pre-existing mechanism to provide a malicious update, either through a social engineering effort, privileged access to replace downloaded updates in transit, or by performing an Attacker-in-the-Middle attack on the update service itself.
Credit: cve@rapid7.con cve@rapid7.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rapid7 InsightVM | <6.6.172 | |
Rapid7 Nexpose | <6.6.172 | |
<6.6.172 | ||
<6.6.172 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4261 is a vulnerability in Rapid7 Nexpose and InsightVM versions prior to 6.6.172 that allows an attacker to provide a malicious update and alter the functionality.
CVE-2022-4261 affects Rapid7 Nexpose and InsightVM versions prior to 6.6.172 by failing to reliably validate the authenticity of update contents.
The severity of CVE-2022-4261 is medium with a CVSS score of 6.5.
An attacker can exploit CVE-2022-4261 by providing a malicious update to Rapid7 Nexpose and InsightVM.
To fix CVE-2022-4261, update Rapid7 Nexpose and InsightVM to version 6.6.172 or later.