CVE-2026-6482
- EPSS 0.01%
- Veröffentlicht 17.04.2026 06:16:30
- Zuletzt bearbeitet 17.04.2026 15:38:09
The Rapid7 Insight Agent (versions > 4.1.0.2) is vulnerable to a local privilege escalation attack that allows users to gain SYSTEM level control of a Windows host. Upon startup the agent service attempts to load an OpenSSL configuration file from a ...
CVE-2026-4482
- EPSS 0.01%
- Veröffentlicht 10.04.2026 05:16:04
- Zuletzt bearbeitet 13.04.2026 15:02:06
The installer certificate files in the …/bootstrap/common/ssl folder do not seem to have restricted permissions on Windows systems (users have read and execute access). For the client.key file in particular, this could potentially lead to exploits, a...
CVE-2026-4837
- EPSS 0.23%
- Veröffentlicht 08.04.2026 15:59:03
- Zuletzt bearbeitet 08.04.2026 21:26:13
An eval() injection vulnerability in the Rapid7 Insight Agent beaconing logic for Linux versions could theoretically allow an attacker to achieve remote code execution as root via a crafted beacon response. Because the Agent uses mutual TLS (mTLS) to...
CVE-2024-3185
- EPSS 0.03%
- Veröffentlicht 23.04.2024 09:15:07
- Zuletzt bearbeitet 15.04.2026 00:35:42
A key used in logging.json does not follow the least privilege principle by default and is exposed to local users in the Rapid7 Platform. This allows an attacker with local access to a machine with the logging.json file to use that key to authentic...
CVE-2023-2273
- EPSS 0.19%
- Veröffentlicht 26.04.2023 09:15:09
- Zuletzt bearbeitet 21.11.2024 07:58:17
Rapid7 Insight Agent token handler versions 3.2.6 and below, suffer from a Directory Traversal vulnerability whereby unsanitized input from a CLI argument flows into io.ioutil.WriteFile, where it is used as a path. This can result in a Path Traversal...
CVE-2022-0237
- EPSS 0.06%
- Veröffentlicht 17.03.2022 23:15:07
- Zuletzt bearbeitet 21.11.2024 06:38:12
Rapid7 Insight Agent versions 3.1.2.38 and earlier suffer from a privilege escalation vulnerability, whereby an attacker can hijack the flow of execution due to an unquoted argument to the runas.exe command used by the ir_agent.exe component, resulti...
CVE-2021-4016
- EPSS 0.05%
- Veröffentlicht 21.01.2022 18:15:08
- Zuletzt bearbeitet 21.11.2024 06:36:43
Rapid7 Insight Agent, versions prior to 3.1.3, suffer from an improper access control vulnerability whereby, the user has access to the snapshot directory. An attacker can access, read and copy any of the files in this directory e.g. asset_info.json ...
CVE-2021-4007
- EPSS 0.04%
- Veröffentlicht 14.12.2021 15:15:07
- Zuletzt bearbeitet 21.11.2024 06:36:42
Rapid7 Insight Agent, versions 3.0.1 to 3.1.2.34, suffer from a local privilege escalation due to an uncontrolled DLL search path. Specifically, when Insight Agent versions 3.0.1 to 3.1.2.34 start, the Python interpreter attempts to load python3.dll ...
CVE-2019-5629
- EPSS 0.12%
- Veröffentlicht 13.07.2019 01:15:10
- Zuletzt bearbeitet 21.11.2024 04:45:16
Rapid7 Insight Agent, version 2.6.3 and prior, suffers from a local privilege escalation due to an uncontrolled DLL search path. Specifically, when Insight Agent 2.6.3 and prior starts, the Python interpreter attempts to load python3.dll at "C:\DLLs\...