Insufficient Entropy in Rapid7 Nexpose Affects Password Security
CVE-2026-1814
Key Information:
- Vendor
Rapid7
- Status
- Vendor
- CVE Published:
- 3 February 2026
Badges
What is CVE-2026-1814?
Rapid7 Nexpose versions 6.4.50 and later are affected by an insufficient entropy vulnerability in the CredentialsKeyStorePassword.generateRandomPassword() method. When legacy keystore passwords are updated, the application generates a new password that is inadequately protected, with a length of only 7-12 characters and a predictable static prefix 'p'. This leads to a weak keyspace that can be exploited. An attacker with access to the nsc.ks file can leverage consumer-grade hardware to perform brute-force attacks against these weak passwords, potentially decrypting sensitive stored credentials.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
InsightVM/Nexpose Linux 8.24.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
