Description
The Rapid7 Insight Agent (versions > 4.1.0.2) is vulnerable to a local privilege escalation attack that allows users to gain SYSTEM level control of a Windows host. Upon startup the agent service attempts to load an OpenSSL configuration file from a non-existent directory that is writable by standard users. By planting a crafted openssl.cnf file an attacker can trick the high-privilege service into executing arbitrary commands. This effectively permits an unprivileged user to bypass security controls and achieve a full host compromise under the agent’s SYSTEM level access.
INFO
Published Date :
2026-04-17T05:19:20.485Z
Last Modified :
2026-04-18T03:55:55.477Z
Source :
rapid7
AFFECTED PRODUCTS
The following products are affected by CVE-2026-6482 vulnerability.
| Vendors | Products |
|---|---|
| Rapid7 |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-6482.