Description
Rapid7 InsightVM versions before 8.34.0 contain a signature verification issue on the Assertion Consumer Service (ACS) cloud endpoint that could allow an attacker to gain unauthorized access to InsightVM accounts setup
via "Security Console" installations, resulting in full account takeover. The issue occurs due to the application processing these unsigned assertions and issuing session cookies that granted access to the
targeted user accounts. This has been fixed in version 8.34.0 of InsightVM.
Published: 2026-02-03
Score: 9.6 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Account Takeover
Action: Immediate Patch
AI Analysis

Impact

Rapid7 InsightVM versions prior to 8.34.0 suffer from a signature validation flaw on the Assertion Consumer Service cloud endpoint. The application accepts unsigned SAML assertions and issues session cookies that grant the attacker access to the target account. This flaw could let an attacker take full control of a user’s InsightVM account and any resources that the account can access. The weakness involves authentication bypass (CWE‑287) and improper authorization checks (CWE‑347).

Affected Systems

Rapid7 Vulnerability Management InsightVM deployed via Security Console installations, any instance running a version earlier than 8.34.0 is susceptible.

Risk and Exploitability

The CVSS base score of 9.6 indicates a critical impact. The EPSS score is below 1%, suggesting it is rarely exploited in the wild. The vulnerability is not listed in the CISA KEV catalog, but because it permits full account take‑over, it poses a high risk if compromised. Attackers would need to craft a malicious SAML assertion and send it to the ACS endpoint, which can be done remotely over the internet, making the attack vector likely remote and publicly reachable.

Generated by OpenCVE AI on April 18, 2026 at 00:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s patch by upgrading Rapid7 InsightVM to version 8.34.0 or later immediately.
  • Restrict access to the Assertion Consumer Service cloud endpoint to trusted networks or enforce authentication of callers to prevent unauthenticated SAML assertions.
  • Enable comprehensive logging of SAML assertion requests and monitor for anomalous or unsigned assertions; review logs for potential compromise.

Generated by OpenCVE AI on April 18, 2026 at 00:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Rapid7
Rapid7 insightvm
Vendors & Products Rapid7
Rapid7 insightvm

Tue, 03 Feb 2026 17:00:00 +0000

Type Values Removed Values Added
Description Rapid7 InsightVM versions before 8.34.0 contain a signature verification issue on the Assertion Consumer Service (ACS) cloud endpoint that could allow an attacker to gain unauthorized access to InsightVM accounts setup via "Security Console" installations, resulting in full account takeover. The issue occurs due to the application processing these unsigned assertions and issuing session cookies that granted access to the targeted user accounts. This has been fixed in version 8.34.0 of InsightVM.
Title Rapid7 InsightVM Signature Validation Vulnerability
Weaknesses CWE-287
CWE-347
References
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N'}


Subscriptions

Rapid7 Insightvm
cve-icon MITRE

Status: PUBLISHED

Assigner: rapid7

Published:

Updated: 2026-02-26T15:04:27.845Z

Reserved: 2026-01-28T20:21:17.363Z

Link: CVE-2026-1568

cve-icon Vulnrichment

Updated: 2026-02-23T18:22:35.208Z

cve-icon NVD

Status : Deferred

Published: 2026-02-03T17:15:59.893

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1568

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T00:30:25Z

Weaknesses