The Rapid7 Insight Agent (versions > 4.1.0.2) is vulnerable to a local privilege escalation attack that allows users to gain SYSTEM level control of a Windows host. Upon startup the agent service attempts to load an OpenSSL configuration file from a non-existent directory that is writable by standard users. By planting a crafted openssl.cnf file an attacker can trick the high-privilege service into executing arbitrary commands. This effectively permits an unprivileged user to bypass security controls and achieve a full host compromise under the agent’s SYSTEM level access.
References
| Link | Resource |
|---|---|
| https://docs.rapid7.com/insight/release-notes-2026-april/#improvements-and-fixes | Release Notes |
Configurations
History
28 Apr 2026, 18:14
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://docs.rapid7.com/insight/release-notes-2026-april/#improvements-and-fixes - Release Notes | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| First Time |
Rapid7 insight Agent
Rapid7 |
|
| CPE | cpe:2.3:a:rapid7:insight_agent:*:*:*:*:*:*:*:* |
17 Apr 2026, 06:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-17 06:16
Updated : 2026-04-28 18:14
NVD link : CVE-2026-6482
Mitre link : CVE-2026-6482
CVE.ORG link : CVE-2026-6482
JSON object : View
Products Affected
rapid7
- insight_agent
CWE
CWE-829
Inclusion of Functionality from Untrusted Control Sphere
