Description Preview
Overview
This vulnerability (CVE-2021-3844) in Rapid7 InsightVM allows existing user sessions to remain active even after security-critical changes are made to the user account by an administrator. In a typical scenario, if a credential leak is discovered and an administrator changes a user's password as a security measure, any active sessions associated with that compromised account will not be terminated. This means that an attacker who has already logged in using the leaked credentials can continue to operate within the system despite the password change, potentially causing further damage or maintaining unauthorized access. This issue is related to a previous vulnerability (CVE-2019-5638) and represents a significant session management flaw that could undermine security incident response efforts.
Remediation
To mitigate this vulnerability, Rapid7 recommends enabling the Platform Login feature for InsightVM. This feature provides improved session management capabilities that help address the insufficient session expiration issue. Organizations using InsightVM should:
- Enable the Platform Login feature following the instructions in Rapid7's documentation.
- Ensure that all InsightVM instances are updated to the latest version that includes fixes for this vulnerability.
- Implement additional security controls such as IP restrictions, multi-factor authentication, and session timeout policies where possible.
- Monitor for suspicious activity in user sessions, especially after security-relevant changes are made to user accounts.
- As a best practice during security incidents, manually terminate all active sessions for affected users in addition to changing credentials.
References
- Rapid7 InsightVM Platform Login Documentation: https://docs.rapid7.com/insightvm/enable-insightvm-platform-login
- Related Vulnerability CVE-2019-5638: https://www.cve.org/cverecord?id=CVE-2019-5638
- CWE-613: Insufficient Session Expiration: https://cwe.mitre.org/data/definitions/613.html
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- ConstructionConstruction
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- Health Care & Social AssistanceHealth Care & Social Assistance
- InformationInformation
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- ManufacturingManufacturing
- MiningMining
- Other Services (except Public Administration)Other Services (except Public Administration)
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Public AdministrationPublic Administration
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Retail TradeRetail Trade
- Transportation & WarehousingTransportation & Warehousing
- UtilitiesUtilities
- Wholesale TradeWholesale Trade