CVE-2022-3913

Rapid7 Nexpose Certificate Validation Issue

Description

Rapid7 Nexpose and InsightVM versions 6.6.82 through 6.6.177 fail to validate the certificate of the update server when downloading updates. This failure could allow an attacker in a privileged position on the network to provide their own HTTPS endpoint, or intercept communications to the legitimate endpoint. The attacker would need some pre-existing access to at least one node on the network path between the Rapid7-controlled update server and the Nexpose/InsightVM application, and the ability to either spoof the update server's FQDN or redirect legitimate traffic to the attacker's server in order to exploit this vulnerability. Note that even in this scenario, an attacker could not normally replace an update package with a malicious package, since the update process validates a separate, code-signing certificate, distinct from the HTTPS certificate used for communication. This issue was resolved on February 1, 2023 in update 6.6.178 of Nexpose and InsightVM.

Category

5.3
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.13%
Vendor Advisory rapid7.com Vendor Advisory rapid7.com
Affected: Rapid7 Nexpose
Affected: Rapid7 InsightVM
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2022-3913?
CVE-2022-3913 has been scored as a medium severity vulnerability.
How to fix CVE-2022-3913?
To fix CVE-2022-3913, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2022-3913 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2022-3913 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-3913?
CVE-2022-3913 affects Rapid7 Nexpose, Rapid7 InsightVM.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.