CVE-2021-3844
Rapid7 Vulnerability Management vulnerability analysis and mitigation

Overview

CVE-2021-3844 is a security vulnerability affecting Rapid7 InsightVM that involves insufficient session expiration when an administrator performs security-relevant edits on an existing, logged-on user. The vulnerability was published on March 24, 2023, and received a CVSS v3.1 score of 5.4 (Medium severity) (NVD Results).

Technical details

The vulnerability stems from a session management flaw where user sessions remain valid even after security-critical changes are made to the user account. For example, if an administrator changes a user's password due to a credential leak, the user's current session remains active, potentially allowing an attacker who had compromised the original credentials to maintain access (NVD Results).

Impact

The impact of this vulnerability allows an attacker who has compromised user credentials to maintain access to the system even after the administrator changes the compromised user's password. This continued access could enable the attacker to cause further damage within the system (NVD Results).

Mitigation and workarounds

The vulnerability can be mitigated by using the Platform Login feature. Rapid7 recommends that all eligible users enable InsightVM Platform Login to protect their environment from potential insufficient session expiration vulnerabilities (Rapid7 Docs).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management