CVE-2026-1568

9.6 CRITICAL

📋 TL;DR

A signature verification vulnerability in Rapid7 InsightVM's Assertion Consumer Service allows attackers to bypass authentication and gain unauthorized access to user accounts. This affects all InsightVM installations using Security Console setup before version 8.34.0. Successful exploitation results in full account takeover.

💻 Affected Systems

Products:
  • Rapid7 InsightVM
Versions: All versions before 8.34.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations using Security Console setup with SAML authentication via the Assertion Consumer Service endpoint.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all InsightVM accounts, allowing attackers to access sensitive vulnerability data, modify scan results, and potentially pivot to other systems.

🟠

Likely Case

Targeted account takeover of specific InsightVM users, leading to unauthorized access to vulnerability data and potential data exfiltration.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to the vulnerable endpoint.

🌐 Internet-Facing: HIGH - The ACS cloud endpoint is typically internet-facing for SAML authentication, making it directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they can reach the vulnerable endpoint, though external exposure is more likely.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated exploitation by sending specially crafted SAML assertions to the ACS endpoint without requiring valid credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.34.0

Vendor Advisory: https://docs.rapid7.com/insight/command-platform-release-notes/

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download InsightVM version 8.34.0 or later from Rapid7 portal. 3. Stop InsightVM services. 4. Apply the update following Rapid7's upgrade documentation. 5. Restart services and verify functionality.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to the ACS endpoint to only trusted identity providers

SAML Configuration Review

all

Review and harden SAML configuration settings

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate InsightVM from untrusted networks
  • Enable multi-factor authentication for all InsightVM accounts as additional protection layer

🔍 How to Verify

Check if Vulnerable:

Check InsightVM version via web interface or command line. If version is below 8.34.0 and using Security Console with SAML, the system is vulnerable.

Check Version:

On Windows: Check InsightVM version in web interface. On Linux: Check installation directory version files or use 'rpm -qa | grep insightvm' or equivalent package manager command.

Verify Fix Applied:

After upgrading to 8.34.0 or later, verify that SAML assertions are properly validated and session cookies are only issued for signed assertions.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful login from unexpected sources
  • SAML assertion processing errors
  • Session creation without proper authentication logs

Network Indicators:

  • Unusual traffic patterns to /acs endpoint
  • SAML requests from unexpected IP addresses
  • High volume of authentication requests

SIEM Query:

source="insightvm" AND (event_type="authentication" AND result="success") AND NOT (source_ip IN [trusted_ip_list])

🔗 References

📤 Share & Export