Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:rapid7:insightvm:*:*:*:*:*:*:*:*", "matchCriteriaId": "8445EB28-3D0F-44C4-A6E8-D79FC0C12AA6", "versionEndExcluding": "6.6.172", "vulnerable": true}, {"criteria": "cpe:2.3:a:rapid7:nexpose:*:*:*:*:*:*:*:*", "matchCriteriaId": "17F4869F-E078-44DD-AF60-7D1791240783", "versionEndExcluding": "6.6.172", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Rapid7 Nexpose and InsightVM versions prior to 6.6.172 failed to reliably validate the authenticity of update contents. This failure could allow an attacker to provide a malicious update and alter the functionality of Rapid7 Nexpose. The attacker would need some pre-existing mechanism to provide a malicious update, either through a social engineering effort, privileged access to replace downloaded updates in transit, or by performing an Attacker-in-the-Middle attack on the update service itself.\n\n"}, {"lang": "es", "value": "Las versiones de Rapid7 Nexpose e InsightVM anteriores a la 6.6.172 no lograron validar de manera confiable la autenticidad del contenido de la actualizaci\u00f3n. Este fallo podr\u00eda permitir que un atacante proporcione una actualizaci\u00f3n maliciosa y altere la funcionalidad de Rapid7 Nexpose. El atacante necesitar\u00eda alg\u00fan mecanismo preexistente para proporcionar una actualizaci\u00f3n maliciosa, ya sea mediante un esfuerzo de ingenier\u00eda social, acceso privilegiado para reemplazar las actualizaciones descargadas en tr\u00e1nsito o realizando un ataque de atacante en el medio en el propio servicio de actualizaci\u00f3n."}], "id": "CVE-2022-4261", "lastModified": "2024-11-21T07:34:53.797", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.1"}, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "cve@rapid7.com", "type": "Secondary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2022-12-08T00:15:10.533", "references": [{"source": "cve@rapid7.com", "tags": ["Release Notes", "Vendor Advisory"], "url": "https://docs.rapid7.com/release-notes/insightvm/20221207/"}, {"source": "cve@rapid7.com", "tags": ["Release Notes", "Vendor Advisory"], "url": "https://docs.rapid7.com/release-notes/nexpose/20221207/"}, {"source": "cve@rapid7.com", "tags": ["Exploit", "Mitigation", "Vendor Advisory"], "url": "https://www.rapid7.com/blog/post/2022/12/7/cve-2022-4261-rapid7-nexpose-update-validation-issue-fixed"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes", "Vendor Advisory"], "url": "https://docs.rapid7.com/release-notes/insightvm/20221207/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes", "Vendor Advisory"], "url": "https://docs.rapid7.com/release-notes/nexpose/20221207/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Mitigation", "Vendor Advisory"], "url": "https://www.rapid7.com/blog/post/2022/12/7/cve-2022-4261-rapid7-nexpose-update-validation-issue-fixed"}], "sourceIdentifier": "cve@rapid7.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-494"}], "source": "cve@rapid7.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-494"}], "source": "nvd@nist.gov", "type": "Primary"}]}