CVE-2026-1814: CWE-331 Insufficient Entropy in Rapid7 InsightVM/Nexpose
CVE-2026-1814 is a high-severity vulnerability in Rapid7 InsightVM/Nexpose (version 8. 24. 0) caused by insufficient entropy in password generation for legacy keystore updates. The generateRandomPassword() method produces weak passwords with a static prefix and limited length, drastically reducing the keyspace. An attacker with access to the nsc. ks keystore file can brute-force these passwords using consumer-grade hardware to decrypt stored credentials. This vulnerability requires high privileges to access the keystore file but does not require user interaction. Exploitation could lead to credential compromise, impacting confidentiality and integrity of scanned assets. No known exploits are currently reported in the wild. European organizations using InsightVM/Nexpose should prioritize patching or mitigating this flaw to protect sensitive credential data.
AI Analysis
Technical Summary
CVE-2026-1814 identifies a cryptographic weakness in Rapid7's InsightVM/Nexpose vulnerability management products, specifically in versions 8.24.0 and later. The vulnerability stems from the CredentialsKeyStorePassword.generateRandomPassword() method, which is responsible for generating new passwords when updating legacy keystore passwords. Instead of producing sufficiently random and lengthy passwords, the method generates passwords between 7 and 12 characters in length, all prefixed with a static character 'p'. This design flaw results in a significantly reduced keyspace and insufficient entropy, making brute-force attacks feasible with modest computing resources. The keystore file (nsc.ks) stores encrypted credentials used by the application to authenticate to target systems during vulnerability scans. If an attacker gains access to this file—requiring high privileges on the host—they can attempt to brute-force the weak password protecting the keystore. Successfully decrypting the keystore would expose stored credentials, potentially allowing attackers to pivot within the network or escalate privileges. The CVSS 4.0 score of 7.5 reflects the network attack vector, high complexity, and the requirement for high privileges, with a significant impact on confidentiality, integrity, and availability of the protected data. No patches or exploit code are currently publicly available, but the vulnerability demands attention due to the sensitive nature of stored credentials and the widespread use of InsightVM/Nexpose in enterprise environments.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of credential data managed by InsightVM/Nexpose. Compromise of stored credentials could enable attackers to access critical internal systems, escalate privileges, and move laterally within networks, potentially leading to data breaches or disruption of services. Given the reliance on vulnerability management tools to secure IT environments, exploitation could undermine trust in security operations and delay remediation efforts. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, face heightened regulatory and reputational risks if credentials are exposed. The requirement for high privileges to access the keystore file somewhat limits the attack surface but does not eliminate risk, especially if insider threats or compromised administrative accounts are present. The absence of known exploits in the wild provides a window for mitigation, but proactive measures are essential to prevent future attacks.
Mitigation Recommendations
European organizations should immediately verify their use of Rapid7 InsightVM/Nexpose version 8.24.0 or later and assess exposure to this vulnerability. Since no official patches are currently available, organizations should implement compensating controls such as restricting access to the nsc.ks keystore file to the minimum necessary administrative accounts and monitoring for unauthorized access attempts. Employing file integrity monitoring on the keystore file can alert to suspicious activity. Additionally, organizations should consider rotating credentials stored in the keystore after remediation to invalidate any potentially compromised passwords. Network segmentation and strict privilege management can reduce the risk of attackers gaining the required access level. Rapid7 customers should monitor vendor advisories for forthcoming patches and apply them promptly once released. Finally, integrating multi-factor authentication and enhanced logging around administrative access can further mitigate exploitation risks.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2026-1814: CWE-331 Insufficient Entropy in Rapid7 InsightVM/Nexpose
Description
CVE-2026-1814 is a high-severity vulnerability in Rapid7 InsightVM/Nexpose (version 8. 24. 0) caused by insufficient entropy in password generation for legacy keystore updates. The generateRandomPassword() method produces weak passwords with a static prefix and limited length, drastically reducing the keyspace. An attacker with access to the nsc. ks keystore file can brute-force these passwords using consumer-grade hardware to decrypt stored credentials. This vulnerability requires high privileges to access the keystore file but does not require user interaction. Exploitation could lead to credential compromise, impacting confidentiality and integrity of scanned assets. No known exploits are currently reported in the wild. European organizations using InsightVM/Nexpose should prioritize patching or mitigating this flaw to protect sensitive credential data.
AI-Powered Analysis
Technical Analysis
CVE-2026-1814 identifies a cryptographic weakness in Rapid7's InsightVM/Nexpose vulnerability management products, specifically in versions 8.24.0 and later. The vulnerability stems from the CredentialsKeyStorePassword.generateRandomPassword() method, which is responsible for generating new passwords when updating legacy keystore passwords. Instead of producing sufficiently random and lengthy passwords, the method generates passwords between 7 and 12 characters in length, all prefixed with a static character 'p'. This design flaw results in a significantly reduced keyspace and insufficient entropy, making brute-force attacks feasible with modest computing resources. The keystore file (nsc.ks) stores encrypted credentials used by the application to authenticate to target systems during vulnerability scans. If an attacker gains access to this file—requiring high privileges on the host—they can attempt to brute-force the weak password protecting the keystore. Successfully decrypting the keystore would expose stored credentials, potentially allowing attackers to pivot within the network or escalate privileges. The CVSS 4.0 score of 7.5 reflects the network attack vector, high complexity, and the requirement for high privileges, with a significant impact on confidentiality, integrity, and availability of the protected data. No patches or exploit code are currently publicly available, but the vulnerability demands attention due to the sensitive nature of stored credentials and the widespread use of InsightVM/Nexpose in enterprise environments.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of credential data managed by InsightVM/Nexpose. Compromise of stored credentials could enable attackers to access critical internal systems, escalate privileges, and move laterally within networks, potentially leading to data breaches or disruption of services. Given the reliance on vulnerability management tools to secure IT environments, exploitation could undermine trust in security operations and delay remediation efforts. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, face heightened regulatory and reputational risks if credentials are exposed. The requirement for high privileges to access the keystore file somewhat limits the attack surface but does not eliminate risk, especially if insider threats or compromised administrative accounts are present. The absence of known exploits in the wild provides a window for mitigation, but proactive measures are essential to prevent future attacks.
Mitigation Recommendations
European organizations should immediately verify their use of Rapid7 InsightVM/Nexpose version 8.24.0 or later and assess exposure to this vulnerability. Since no official patches are currently available, organizations should implement compensating controls such as restricting access to the nsc.ks keystore file to the minimum necessary administrative accounts and monitoring for unauthorized access attempts. Employing file integrity monitoring on the keystore file can alert to suspicious activity. Additionally, organizations should consider rotating credentials stored in the keystore after remediation to invalidate any potentially compromised passwords. Network segmentation and strict privilege management can reduce the risk of attackers gaining the required access level. Rapid7 customers should monitor vendor advisories for forthcoming patches and apply them promptly once released. Finally, integrating multi-factor authentication and enhanced logging around administrative access can further mitigate exploitation risks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- rapid7
- Date Reserved
- 2026-02-03T14:05:09.471Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698210fef9fa50a62fce298c
Added to database: 2/3/2026, 3:15:10 PM
Last enriched: 2/3/2026, 3:29:32 PM
Last updated: 2/3/2026, 5:24:59 PM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1568: CWE-347 Improper Verification of Cryptographic Signature in Rapid7 Vulnerability Management
CriticalCVE-2025-67857: Insertion of Sensitive Information Into Sent Data
MediumCVE-2025-67856
MediumCVE-2025-67855: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
MediumCVE-2025-67853: Improper Restriction of Excessive Authentication Attempts
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.