Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1814: CWE-331 Insufficient Entropy in Rapid7 InsightVM/Nexpose

0
High
VulnerabilityCVE-2026-1814cvecve-2026-1814cwe-331
Published: Tue Feb 03 2026 (02/03/2026, 14:54:12 UTC)
Source: CVE Database V5
Vendor/Project: Rapid7
Product: InsightVM/Nexpose

Description

CVE-2026-1814 is a high-severity vulnerability in Rapid7 InsightVM/Nexpose (version 8. 24. 0) caused by insufficient entropy in password generation for legacy keystore updates. The generateRandomPassword() method produces weak passwords with a static prefix and limited length, drastically reducing the keyspace. An attacker with access to the nsc. ks keystore file can brute-force these passwords using consumer-grade hardware to decrypt stored credentials. This vulnerability requires high privileges to access the keystore file but does not require user interaction. Exploitation could lead to credential compromise, impacting confidentiality and integrity of scanned assets. No known exploits are currently reported in the wild. European organizations using InsightVM/Nexpose should prioritize patching or mitigating this flaw to protect sensitive credential data.

AI-Powered Analysis

AILast updated: 02/03/2026, 15:29:32 UTC

Technical Analysis

CVE-2026-1814 identifies a cryptographic weakness in Rapid7's InsightVM/Nexpose vulnerability management products, specifically in versions 8.24.0 and later. The vulnerability stems from the CredentialsKeyStorePassword.generateRandomPassword() method, which is responsible for generating new passwords when updating legacy keystore passwords. Instead of producing sufficiently random and lengthy passwords, the method generates passwords between 7 and 12 characters in length, all prefixed with a static character 'p'. This design flaw results in a significantly reduced keyspace and insufficient entropy, making brute-force attacks feasible with modest computing resources. The keystore file (nsc.ks) stores encrypted credentials used by the application to authenticate to target systems during vulnerability scans. If an attacker gains access to this file—requiring high privileges on the host—they can attempt to brute-force the weak password protecting the keystore. Successfully decrypting the keystore would expose stored credentials, potentially allowing attackers to pivot within the network or escalate privileges. The CVSS 4.0 score of 7.5 reflects the network attack vector, high complexity, and the requirement for high privileges, with a significant impact on confidentiality, integrity, and availability of the protected data. No patches or exploit code are currently publicly available, but the vulnerability demands attention due to the sensitive nature of stored credentials and the widespread use of InsightVM/Nexpose in enterprise environments.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of credential data managed by InsightVM/Nexpose. Compromise of stored credentials could enable attackers to access critical internal systems, escalate privileges, and move laterally within networks, potentially leading to data breaches or disruption of services. Given the reliance on vulnerability management tools to secure IT environments, exploitation could undermine trust in security operations and delay remediation efforts. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, face heightened regulatory and reputational risks if credentials are exposed. The requirement for high privileges to access the keystore file somewhat limits the attack surface but does not eliminate risk, especially if insider threats or compromised administrative accounts are present. The absence of known exploits in the wild provides a window for mitigation, but proactive measures are essential to prevent future attacks.

Mitigation Recommendations

European organizations should immediately verify their use of Rapid7 InsightVM/Nexpose version 8.24.0 or later and assess exposure to this vulnerability. Since no official patches are currently available, organizations should implement compensating controls such as restricting access to the nsc.ks keystore file to the minimum necessary administrative accounts and monitoring for unauthorized access attempts. Employing file integrity monitoring on the keystore file can alert to suspicious activity. Additionally, organizations should consider rotating credentials stored in the keystore after remediation to invalidate any potentially compromised passwords. Network segmentation and strict privilege management can reduce the risk of attackers gaining the required access level. Rapid7 customers should monitor vendor advisories for forthcoming patches and apply them promptly once released. Finally, integrating multi-factor authentication and enhanced logging around administrative access can further mitigate exploitation risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
rapid7
Date Reserved
2026-02-03T14:05:09.471Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698210fef9fa50a62fce298c

Added to database: 2/3/2026, 3:15:10 PM

Last enriched: 2/3/2026, 3:29:32 PM

Last updated: 2/3/2026, 5:24:59 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats