// For flags

CVE-2019-5615

Rapid7 InsightVM Stored Credential Exposure

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Users with Site-level permissions can access files containing the username-encrypted passwords of Security Console Global Administrators and clear-text passwords for restoring backups, as well as the salt for those passwords. Valid credentials are required to access these files and malicious users would still need to perform additional work to decrypt the credentials and escalate privileges. This issue affects: Rapid7 InsightVM versions 6.5.11 through 6.5.49.

Los usuarios con permisos Site-level pueden acceder a los archivos que contienen las contraseñas cifradas con el nombre de usuario de los Administradores Globales de la Consola de Seguridad y las contraseñas de texto sin cifrar para restaurar las copias de seguridad, así como la sal para esas contraseñas. Se requieren credenciales válidas para acceder a estos archivos y los usuarios maliciosos aún tendrían que realizar un trabajo adicional para descifrar las credenciales y escalar los privilegios. Este problema afecta a: Rapid7 InsightVM versiones 6.5.11 hasta 6.5.49.

*Credits: This issue was discovered, and reported to Rapid7, by Robert Elliott from IBM Security. It is being disclosed in accordance Rapid7's vulnerability disclosure policy (https://www.rapid7.com/disclosure/).
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-01-07 CVE Reserved
  • 2019-04-09 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-257: Storing Passwords in a Recoverable Format
  • CWE-522: Insufficiently Protected Credentials
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Rapid7
Search vendor "Rapid7"
Insightvm
Search vendor "Rapid7" for product "Insightvm"
>= 6.5.11 <= 6.5.49
Search vendor "Rapid7" for product "Insightvm" and version " >= 6.5.11 <= 6.5.49"
-
Affected