CVE-2022-4261
low-risk
Published 2022-12-08
Rapid7 Nexpose and InsightVM versions prior to 6.6.172 failed to reliably validate the authenticity of update contents. This failure could allow an attacker to provide a malicious update and alter the functionality of Rapid7 Nexpose. The attacker would need some pre-existing mechanism to provide a malicious update, either through a social engineering effort, privileged access to replace downloaded updates in transit, or by performing an Attacker-in-the-Middle attack on the update service itself.
Do I need to act?
-
0.10% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.4/10
Medium
LOCAL
/ HIGH complexity
Affected Products (2)
Insightvm
Nexpose
Affected Vendors
References (6)
Release Notes
https://docs.rapid7.com/release-notes/nexpose/20221207/
Release Notes
https://docs.rapid7.com/release-notes/nexpose/20221207/
18
/ 100
low-risk
Severity
11/34 · Low
Exploitability
0/34 · Minimal
Exposure
7/34 · Low