Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1568: CWE-347 Improper Verification of Cryptographic Signature in Rapid7 Vulnerability Management

0
Critical
VulnerabilityCVE-2026-1568cvecve-2026-1568cwe-347cwe-287
Published: Tue Feb 03 2026 (02/03/2026, 16:47:03 UTC)
Source: CVE Database V5
Vendor/Project: Rapid7
Product: Vulnerability Management

Description

Rapid7 InsightVM versions before 8.34.0 contain a signature verification issue on the Assertion Consumer Service (ACS) cloud endpoint that could allow an attacker to gain unauthorized access to InsightVM accounts setup via "Security Console" installations, resulting in full account takeover. The issue occurs due to the application processing these unsigned assertions and issuing session cookies that granted access to the targeted user accounts. This has been fixed in version 8.34.0 of InsightVM.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 20:21:13 UTC

Technical Analysis

CVE-2026-1568 is a critical security vulnerability identified in Rapid7 InsightVM, a widely used vulnerability management platform. The flaw resides in the Assertion Consumer Service (ACS) cloud endpoint, which is responsible for processing SAML authentication assertions. Specifically, versions prior to 8.34.0 fail to properly verify cryptographic signatures on these assertions, violating CWE-347 (Improper Verification of Cryptographic Signature). This improper verification allows an attacker to submit unsigned or tampered SAML assertions that the system erroneously accepts as valid. Consequently, the application issues session cookies granting access to targeted user accounts without proper authentication, effectively enabling full account takeover. The vulnerability also relates to CWE-287 (Improper Authentication), as the authentication mechanism is bypassed. The CVSS 3.1 base score is 9.6, reflecting network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N), with a scope change (S:C) and high impact on confidentiality and integrity (C:H/I:H) but no impact on availability (A:N). This vulnerability compromises the confidentiality and integrity of user accounts, potentially exposing sensitive vulnerability management data and administrative controls. Rapid7 has addressed this issue in InsightVM version 8.34.0, and users are urged to upgrade promptly. No public exploits have been observed yet, but the ease of exploitation and critical impact make this a high-priority threat.

Potential Impact

The impact of CVE-2026-1568 is severe for organizations using vulnerable versions of Rapid7 InsightVM. Successful exploitation results in full account takeover of InsightVM user accounts configured via Security Console installations. This can lead to unauthorized access to sensitive vulnerability data, security configurations, and potentially administrative functions within the platform. Attackers could manipulate vulnerability assessments, suppress detection of critical issues, or gain footholds for further network compromise. The breach of confidentiality and integrity undermines trust in the vulnerability management process and could delay or distort remediation efforts. Given InsightVM's role in managing security posture, compromised accounts could facilitate lateral movement, data exfiltration, or sabotage of security operations. The vulnerability's network accessibility and lack of user interaction requirement increase the risk of widespread exploitation. Organizations globally relying on InsightVM for vulnerability management face significant operational and security risks until patched.

Mitigation Recommendations

To mitigate CVE-2026-1568, organizations should immediately upgrade Rapid7 InsightVM to version 8.34.0 or later, where the signature verification flaw is corrected. Until patching is complete, restrict network access to the ACS cloud endpoint to trusted IP addresses and monitor authentication logs for unusual SAML assertion activity or unexpected session creations. Implement multi-factor authentication (MFA) on InsightVM accounts to add an additional security layer against account takeover. Review and tighten Security Console configurations to minimize exposure. Conduct regular audits of user sessions and account activities to detect anomalies. Additionally, consider deploying web application firewalls (WAFs) with custom rules to detect and block malformed or unsigned SAML assertions. Educate security teams about this vulnerability to ensure rapid incident response if exploitation attempts are detected. Maintain up-to-date backups of InsightVM configurations and data to enable recovery if compromise occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
rapid7
Date Reserved
2026-01-28T20:21:17.363Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69822999f9fa50a62fd3ce12

Added to database: 2/3/2026, 5:00:09 PM

Last enriched: 3/3/2026, 8:21:13 PM

Last updated: 3/20/2026, 11:39:58 PM

Views: 97

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses