← Back to CVEs
CVE-2021-3844
MEDIUM5.7
Description
Rapid7 InsightVM suffers from insufficient session expiration when an administrator performs a security relevant edit on an existing, logged on user. For example, if a user's password is changed by an administrator due to an otherwise unrelated credential leak, that user account's current session is still valid after the password change, potentially allowing the attacker who originally compromised the credential to remain logged in and able to cause further damage. This vulnerability is mitigated by the use of the Platform Login feature. This issue is related to CVE-2019-5638.
CVE Details
CVSS v3.1 Score5.7
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredHIGH
User InteractionREQUIRED
Published3/24/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
rapid7:insightvm
Weaknesses (CWE)
CWE-613CWE-613
References
https://www.cve.org/cverecord?id=CVE-2019-5638(cve@rapid7.com)
https://docs.rapid7.com/insightvm/enable-insightvm-platform-login(af854a3a-2127-422b-91ae-364da2661108)
https://www.cve.org/cverecord?id=CVE-2019-5638(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.