Lucene search

K
cveRapid7CVE-2024-6504
HistoryJul 18, 2024 - 10:15 a.m.

CVE-2024-6504

2024-07-1810:15:03
CWE-693
rapid7
web.nvd.nist.gov
4
cve-2024-6504
rapid7 insightvm
network access
protection mechanism
cpu exhaustion

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

AI Score

4.8

Confidence

High

EPSS

0.001

Percentile

17.7%

Rapid7 InsightVM Console versions below 6.6.260 suffer from a protection mechanism failure whereby an attacker with network access to the InsightVM Console can cause it to overload or crash by sending repeated invalid REST requests in a short timeframe, to the Console’s port 443 causing the console to enter an exception handling logging loop, exhausting the CPU. There is no indication that an attacker can use this method to escalate privilege, acquire unauthorized access to data, or gain control of protected resources. This issue is fixed in version 6.6.261.

Affected configurations

Nvd
Node
rapid7insightvmRange<6.6.261
VendorProductVersionCPE
rapid7insightvm*cpe:2.3:a:rapid7:insightvm:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "InsightVM",
    "vendor": "Rapid7",
    "versions": [
      {
        "lessThan": "6.6.261",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

AI Score

4.8

Confidence

High

EPSS

0.001

Percentile

17.7%

Related for CVE-2024-6504