The Rapid7 Insight Agent (versions > 4.1.0.2) is vulnerable to a local privilege escalation attack that allows users to gain SYSTEM level control of a Windows host. Upon startup the agent service attempts to load an OpenSSL configuration file from a non-existent directory that is writable by standard users. By planting a crafted openssl.cnf file an attacker can trick the high-privilege service into executing arbitrary commands. This effectively permits an unprivileged user to bypass security controls and achieve a full host compromise under the agent’s SYSTEM level access.
History

Fri, 17 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 17 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Rapid7
Rapid7 insight Agent
Vendors & Products Rapid7
Rapid7 insight Agent

Fri, 17 Apr 2026 06:15:00 +0000

Type Values Removed Values Added
Description The Rapid7 Insight Agent (versions > 4.1.0.2) is vulnerable to a local privilege escalation attack that allows users to gain SYSTEM level control of a Windows host. Upon startup the agent service attempts to load an OpenSSL configuration file from a non-existent directory that is writable by standard users. By planting a crafted openssl.cnf file an attacker can trick the high-privilege service into executing arbitrary commands. This effectively permits an unprivileged user to bypass security controls and achieve a full host compromise under the agent’s SYSTEM level access.
Title Local Privilege Escalation via OpenSSL configuration file in Insight Agent
Weaknesses CWE-829
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: rapid7

Published:

Updated: 2026-04-17T12:16:15.294Z

Reserved: 2026-04-17T04:25:38.616Z

Link: CVE-2026-6482

cve-icon Vulnrichment

Updated: 2026-04-17T12:16:11.716Z

cve-icon NVD

Status : Received

Published: 2026-04-17T06:16:30.593

Modified: 2026-04-17T06:16:30.593

Link: CVE-2026-6482

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T08:30:13Z