Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1814: CWE-331 Insufficient Entropy in Rapid7 InsightVM/Nexpose

0
Medium
VulnerabilityCVE-2026-1814cvecve-2026-1814cwe-331
Published: Tue Feb 03 2026 (02/03/2026, 14:54:12 UTC)
Source: CVE Database V5
Vendor/Project: Rapid7
Product: InsightVM/Nexpose

Description

Rapid7 Nexpose versions 6.4.50 and later are vulnerable to an insufficient entropy issue in the CredentialsKeyStorePassword.generateRandomPassword() method. When updating legacy keystore passwords, the application generates a new password with insufficient length (7-12 characters) and a static prefix 'p', resulting in a weak keyspace. An attacker with access to the nsc.ks file can brute-force this password using consumer-grade hardware to decrypt stored credentials.

AI-Powered Analysis

AILast updated: 02/27/2026, 07:49:49 UTC

Technical Analysis

CVE-2026-1814 identifies a cryptographic weakness in Rapid7 InsightVM/Nexpose, specifically in the CredentialsKeyStorePassword.generateRandomPassword() method introduced in version 6.4.50 and later. When legacy keystore passwords are updated, the system generates new passwords that are insufficiently random and short, ranging from 7 to 12 characters, and always starting with the static prefix 'p'. This design flaw drastically reduces the effective keyspace, making brute-force attacks feasible with modest computational resources. An attacker who gains access to the nsc.ks keystore file can attempt to brute-force the password protecting stored credentials. Since the password protects sensitive credential data used by the vulnerability management platform, successful brute-forcing can lead to exposure of these credentials, potentially enabling further compromise of scanned assets. The vulnerability requires the attacker to have high privileges on the host to access the keystore file, and no user interaction is needed. The CVSS 4.0 base score is 6.8, reflecting a medium severity with local attack vector, high attack complexity, and high impact on confidentiality. No patches or exploits are currently publicly available, but the weakness in password generation represents a significant risk to credential confidentiality in affected environments.

Potential Impact

The primary impact of this vulnerability is the potential compromise of stored credentials within Rapid7 InsightVM/Nexpose environments. If an attacker with high privileges on the host can access the nsc.ks keystore file, they can brute-force the weakly generated password and decrypt sensitive credentials used for vulnerability scanning and asset management. This can lead to unauthorized access to critical infrastructure, lateral movement, and escalation of privileges within an organization’s network. The confidentiality of credential data is severely impacted, while integrity and availability are less directly affected. Organizations relying on InsightVM/Nexpose for vulnerability management could face increased risk of credential theft and subsequent exploitation of scanned systems. The medium CVSS score reflects that exploitation requires local access and high privileges, limiting the scope but still posing a significant threat in compromised environments. The lack of known exploits reduces immediate risk but does not diminish the need for remediation.

Mitigation Recommendations

To mitigate this vulnerability, organizations should: 1) Upgrade Rapid7 InsightVM/Nexpose to a version where this issue is resolved once a patch is released by Rapid7. 2) Until a patch is available, restrict access to the nsc.ks keystore file to only trusted administrators and monitor for unauthorized access attempts. 3) Implement strict host-level access controls and auditing to detect and prevent privilege escalation that could lead to keystore file access. 4) Consider rotating and resetting stored credentials within InsightVM/Nexpose after remediation to invalidate any potentially compromised secrets. 5) Employ network segmentation and least privilege principles to limit the impact of any credential compromise. 6) Use external credential vaults or secrets management solutions integrated with InsightVM/Nexpose if supported, to reduce reliance on local keystore storage. 7) Monitor vendor advisories for patches and apply them promptly. These steps go beyond generic advice by focusing on protecting the keystore file, controlling privileged access, and credential hygiene.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
rapid7
Date Reserved
2026-02-03T14:05:09.471Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698210fef9fa50a62fce298c

Added to database: 2/3/2026, 3:15:10 PM

Last enriched: 2/27/2026, 7:49:49 AM

Last updated: 3/20/2026, 5:48:00 PM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses