April 2026 Release Notes
Copy link

The Command Platform release notes include information about what’s new, which are updated monthly, and improvements and fixes, which are updated weekly.

ℹ️

Last updated: April 21, 2026

What’s New
Copy link

Learn about new features across the Command Platform. These features were released over the past month and are available now:


Attack surface
Copy link

Your attack surface is comprised of all of the potential entry points that attackers could exploit across your systems, applications, and networks. Developing knowledge of your attack surface is a key goal in improving your company’s security posture.

Automate external attack surface discovery with dynamic seed queries
Copy link

Automate external attack surface discovery using data from Rapid7 and third-party Attack Surface Management (Surface Command) connector seed queries. These seed queries provide domain and IP network data to drive discovery. You can enable supported connectors as EASM seed sources to continuously inform your external attack surface inventory. Initial support includes 12 connectors, such as:

  • Markmonitor for registered domain data
  • NetBox for public network ranges
  • Rapid7 Application Security (InsightAppSec) for configured target domains

With this capability from Command Platform > Assets & Identities > Discovery Seeds, you can:

  • Use domain and network data from integrated tools to power external asset discovery.
  • Automatically update discovery inputs as assets are provisioned or decommissioned.
  • Reduce reliance on manually maintained domain and IP seed lists.

Top of page


Risk
Copy link

Risk is the potential for loss or damage to your assets, operations, or reputation, due to vulnerabilities being exploited by a bad actor.

See asset protection and patching coverage in Remediation Hub
Copy link

Security teams often lack the context to answer key questions, such as whether an asset is protected or why a vulnerability persists after patching. Remediation Hub now provides expanded asset-level visibility so you can understand how assets are protected and patched across your environment. These details are available in remediation details, filters, and exports.

With this capability from Command Platform > Response & Remediation > Remediation Hub, you can:

  • View the endpoint protection applied to each asset.
  • Identify which patch management tool is responsible for updates.
  • Determine whether a reboot is required after patching.

Top of page

Gain more coverage with the Web & App Framework Vulnerability Detection Module
Copy link

Application Security (InsightAppSec) now has coverage for known vulnerabilities in Drupal and WordPress Core, allowing you to measure risk on your current software versions. Understand the technologies in use, such as frameworks, CMSs, and libraries, while seeing if they’re vulnerable.

With this new Attack Module in Scan Configuration > Passive Attack Modules, you can:

  • Gain context-aware scanning, automatically identifying technologies and running targeted checks.
  • Consolidate coverage within Application Security (InsightAppSec), reducing the need for supplementary tools.
  • Improve scan accuracy and streamline testing.

Top of page

Export scan policy data with Bulk Export API
Copy link

You can now export scan policy data alongside the existing Rapid7 Agent (Insight Agent) policy data using the Bulk Export functionality. This improvement has been incorporated into the existing policy request, meaning you can receive this additional data using the same workflows you use today.

With this capability from the Bulk Export API, you can:

  • Access all your policy data within one export.
  • Streamline your policy management processes.
  • Gain an enriched data export using the same requests you use already.

New AlmaLinux Vulnerability Coverage
Copy link

We have released a vulnerability coverage update that will impact AlmaLinux assets. This update improves visibility into vulnerabilities that may already exist in your environment.

With this update in Vulnerability Management (InsightVM) and Nexpose, you may:

  • See see an increase in vulnerabilities detected on AlmaLinux assets.
  • See vulnerabilities associated with older CVEs that remain unpatched. However, the “first found” date will appear recent because it reflects when detection became available.
  • See an increase in risk score. This is an indication of improved coverage, not an increase of actual risk.

No action is required to receive this vulnerability coverage, as it will be included in your next automatic or scheduled update.

Top of page


Threat
Copy link

A threat is any potential event or action that could exploit vulnerabilities in a system, causing harm to assets, data, or operations.

Improve identity investigations with enhanced group membership visibility
Copy link

You can now view group membership details for Okta and Microsoft Entra ID users directly in the User Details page.

With this capability from Users and Accounts, you can:

  • View admin and user group memberships across Active Directory, Okta, and Entra ID in one place.
  • Investigate alerts faster with richer identity context.
  • Reduce blind spots in privilege and access analysis.
  • Strengthen attack surface awareness across hybrid identity environments.

Top of page

Strengthen identity context in Incident Command with user-to-identity mapping
Copy link

You can now map SIEM (InsightIDR) users to their corresponding ASM identity profiles in Incident Command.

With this capability from Users and Accounts, you can:

  • Pivot seamlessly from a SIEM (InsightIDR) user to the corresponding identity profile in ASM.
  • View identity posture instantly, including MFA status, account risk, and group memberships.
  • Improve triage efficiency by eliminating manual user correlation.
  • Gain a unified view of your identity attack surface.

Top of page

Maintain investigation context with persistent search tabs
Copy link

Log Search now preserves open tabs, queries, and context across sessions.

With this capability from Log Search, you can:

  • Resume investigations without rebuilding queries or context.
  • Reduce workflow disruption when switching between tasks.
  • Maintain continuity across SOC and MSSP workflows.
  • Improve operational efficiency and reduce mean time to respond (MTTR).
  • Copy the link to share your open tabs with colleagues.

Top of page

Increase in custom detection rule limits
Copy link

You can now create more custom detection rules, giving you greater flexibility.

With these updated limits, you can:

  • Create and manage more custom detection rules.
  • Expand detection coverage across your environment.
  • Scale your detection strategy as your organization grows.

Top of page

With this update, a new optional field r7_hostid is included in the JSON payload for supported event sources.

This update applies to:

  • Active Directory Admin Activity – Endpoint Agents
  • Endpoint Activity – Local Account Creation
  • Endpoint Activity – Local Service Creation
  • Endpoint Activity – NetBIOS Poisoning

Top of page


Administration
Copy link

Administration focuses on refining platform controls, improving integrations, and streamlining configuration.

Export user access data for audit and compliance
Copy link

Platform administrators can now export a comprehensive view of user access data in CSV format.

With this capability from Command Platform > Users > Export User List, you can:

  • Export a complete list of platform users and their access details.
  • Review user groups, product access, and assigned roles in one place.
  • Validate access policies and support compliance reporting.
  • Generate downloadable reports for audit requests.

Top of page

Access all tenants with a single multi-tenant API key
Copy link

Access tenant data programmatically across all managed tenants using a single multi-tenant API key.

With this capability from Command Platform > Administration > API Key Management, you can:

  • Use a single multi-tenant API key to access data across all tenants.
  • Avoid managing separate credentials.
  • Simplify integrations.
  • Improve operational efficiency and visibility.

Top of page

Improvements and Fixes
Copy link

Keep track of improvements and fixes to core technology.

Application Security (InsightAppSec) and AppSpider
Copy link

No updates released at this time.

Top of page

Attack Surface Management (Surface Command)
Copy link

Version 1.0.905
Copy link

Software release date: April 14, 2026 | Release notes published: April 20, 2026

Improved:

  • Improved clarity and consistency of the search dropdown, making it easier to scan options and interact with results.
  • Simplified widget filter pill tooltips to show only filter values. Removed technical property names and redundant terms so filters are easier to understand at a glance.

Fixed:

  • Connector cards in the Connectors section now show update availability even when the linked import feed fails.

Connectors

The following connectors were updated in the Extension Library  since the previous release. Connector updates are published independently and may have been available before this release date.

New Connectors

  • PDQ Deploy and Inventory: PDQ Deploy and Inventory is a desktop/server-based device management tool that allows IT professionals to scan endpoints for device information, organize devices into collections, and update software through a local network. This connector integrates Devices (Computers) and Collections with the Rapid7 Platform.
  • privacyIDEA Multi-Factor Authentication: privacyIDEA is an open-source, self-hosted multi-factor authentication (MFA) server that manages authentication tokens for users and machines. This connector imports users, machines, and tokens from privacyIDEA, providing visibility into which users have token-based access to which machines.

Updated Connectors

  • Cisco ISE: Fixed CiscoISEAsset handling of null/none value for Mitigation fulfills.
  • Freshservice: Fixed a problem with asset type hierarchy keys (prevents assets being dropped).
  • Infoblox BloxOne DDI: Fixed validation error for type ‘InfobloxSubnet’.
  • Lansweeper Classic: Corrected the DescriptionLock property type to boolean.
  • ManageEngine OpManager: Added validation for Base URL.
  • Microsoft Defender: Fulfilled ‘name’ for user display.
  • SentinelOne Singularity: Updated vulnerability criticality threshold to act as a minimum severity filter, including all vulnerabilities at the selected level and above.

Version 1.0.904
Copy link

Software release date: April 7, 2026 | Release notes published: April 13, 2026

Improved:

  • Improved asset query performance by enabling indexing for equality operator (=) on indexed correlation properties.
  • Updated the dashboard widget override modal to include an Edit Original button for direct editing and improved copy and button placement for better usability.
  • Added Data Reset support to the Import Feed Connector Profile, allowing removal of imported data using a UI button and deletion of connector profiles after clearing all fields.
  • Improved Import Feed Logs performance by reducing data volume per request and displaying entries in reverse chronological order.

Fixed:

  • Numeric widget color picker defaults to the initial color selection when creating or editing widgets.
  • Trend Bars without dimensions render correctly in the UI.
  • Widget sidebar layout maintains consistent vertical spacing when numeric widgets occupy two lines.
  • Workspace query for Case assets executes without error.

Connectors

The following connectors were updated in the Extension Library  since the previous release. Connector updates are published independently and may have been available before this release date.

Updated Connectors

Top of page

Cloud Security (InsightCloudSec)
Copy link

Release availability for self-hosted users

Self-hosted users are able to download the latest version usually 4 business days after SaaS users are upgraded from the following locations:

  • Terraform deployments: Public S3 bucket . Modules can be updated with the terraform get -update command.
  • Amazon Elastic Container Repository (ECR) deployments: You can obtain the ECR build images for this version from the InsightCloudSec ECR Gallery 

Version 26.4.21
Copy link

Software release date: April 21, 2026 | Release notes published: April 20, 2026

Upcoming Changes to OCI Vault and Secret Resource Identification

Planned for version 26.5.5, updates to resource_id generation for the Vault and Secret resource types in Oracle Cloud Infrastructure (OCI) environments will ensure global uniqueness and correct parent-child relationships. The updated format incorporates the Vault OCID.

  • Impact:
    • Existing Vaults and Secrets will be re-identified as new resources on the first harvest after this update.
    • Bots, alerts, or integrations may be triggered if configured to act on newly discovered resource types.

Deprecations

  • Database Instance without Infrastructure Encryption Enabled insight has been marked as deprecated, pending removal in version 26.10.
  • Database Instance With/Without Infrastructure Encryption (PostgreSQL) query filter has been marked as deprecated.

Improved

  • Added new Harvest Visibility filter to the Cloud Listing View filter bar. Users can now filter their cloud accounts by partial, none, or full visibility.
  • Implemented tagging functionality for Azure Logic Apps, which was previously missing despite being listed as supported.
  • Improved session management in IAMPrincipalPermissionCountProcessor.
  • Enhanced bot action configuration to surface Jinja2 templating errors to users on-screen when they occur.
  • Updated Azure Data Factory resource UI actions:
    • Added “Disable Public Network Access” as a UI action.
    • Renamed UI action from “Delete Data Stream” to “Delete Resource”.
  • Improved harvester error handling so that harvesters raising InvalidAzureCredentialsError and UnsupportedAuthType errors now exit with job status CLOUD_INVALID_CREDS.

Updated Insights

  • Storage Container Soft Delete Disabled: Fixed incorrect remediation steps that were mistakenly including instructions for blob-level soft delete instead of container-level soft delete. Removed the blob soft delete checkbox instruction, blob-specific CLI command, and blob documentation reference from the remediation steps. The insight now correctly guides users to enable only container-level soft delete, eliminating confusion with the separate “Storage Container Blob Soft Delete Disabled” insight.
  • Renamed insight from “Resource does not Support TLS 1.2” to “Resource Does Not Enforce Minimum TLS 1.2 Version”.

Fixed

  • Fixed regression not allowing non-ICS user emails to be used in Infrastructure as Code (IaC) Configuration Email Notifications.
  • Resolved an issue where tag (label) modifications on GCP Private Image resources failed from ICS.
  • Fixed an issue that caused on-demand database lifecycle operations to fail with AttributeError: 'ManagedInstancesOperations' object has no attribute 'delete' when deleting Azure SQL Managed Instances.
  • Fixed a bug in ApplicationGrouping background job where double quoted tags would cause the job to fail.
  • Fixed a bug where non-admins with the Viewer entitlement for Bots couldn’t see the bot logs.

Version 26.4.14
Copy link

Software release date: April 14, 2026 | Release notes published: April 13, 2026

Upcoming Changes to OCI Vault and Secret Resource Identification

Planned for version 26.5.5, updates to resource_id generation for the Vault and Secret resource types in Oracle Cloud Infrastructure (OCI) environments will ensure global uniqueness and correct parent-child relationships. The updated format incorporates the Vault OCID.

  • Impact:
    • Existing Vaults and Secrets will be re-identified as new resources on the first harvest after this update
    • Bots, alerts, or integrations may be triggered if configured to act on newly discovered resource types
  • Reason for this change:
    • Previous resource_id generation relied on non-unique display names
    • This could cause referential integrity issues and failed secret harvesting
    • Incorporating the Vault OCID ensures unique and consistent identification across compartments

Improved

  • Consolidated billable resource calculations for improved accuracy and performance.
  • Updated opt-in Layered Context columns default sort to descending order.
  • Renamed the Visibility column title to Harvest Visibility in the Cloud Accounts table for clarity.
  • Updated finding name to “Compromised IAM Credentials Detected” for AWS GuardDuty finding CredentialAccess:IAMUser/CompromisedCredentials.
  • Added filtering for bots with invalid instructions on the Bot Factory listing page.
  • Updated Content Security Policy (CSP) to allow data: sources for loading fonts.
  • Updated the Cloud List page to now display with an icon and details when an AWS account has been onboarded with an IAM permission boundary attached to the role.
  • Added error context modal for harvesters and background jobs to assist with troubleshooting failed jobs.
  • Standardized dropdown selects to use in-product tooltip styling for improved readability and consistency.
  • Updated DMS EDH re-harvest schedule to 20 minutes and added instance_type and storage_size fields for change detection.
  • Removed redundant retention field from Diagnostic Settings query filters.

New Resources

  • Added support for NetAppFilesAccount resource type with new harvester NetAppFilesAccountHarvester:
    • Action for NetAppFilesAccountHarvester: “add tags”
    • New permissions required: Microsoft.NetApp/netAppAccounts/read
  • Added support for ContainerAppJob resource type with new harvester ContainerAppJobHarvester:
    • Action for ContainerAppJobHarvester: “add tags”
    • New permissions required: Microsoft.App/jobs/read

New Insights

  • Azure File Share with NFS Not Configured as Root Squash: Identifies Azure File Shares with NFS that lack root squash configuration.
  • Storage Container Without Locked Immutability Policy: Identifies Storage Containers that do not have a locked immutability policy configured.
  • NetApp Files Account Encryption Key Source Set to Platform-Managed: Identifies NetApp Files accounts using platform-managed encryption keys.
  • Recovery Services Vault With Cross Subscription Restore Enabled: Identifies Recovery Services Vaults that have cross subscription restore enabled. Maps to CIS Azure Storage Services Benchmark v1.0.0 Recommendation 5.2.7.
  • Recovery Services Vault With Public Network Access Enabled: Identifies Recovery Services Vaults that have public network access set to Allow from all networks. Maps to CIS Azure Storage Services Benchmark v1.0.0 Recommendation 5.2.5.
  • Recovery Services Vault Without Infrastructure Encryption Enabled: Identifies Recovery Services Vaults that use Customer-Managed Key (CMK) encryption but do not have infrastructure encryption enabled. Maps to CIS Azure Storage Services Benchmark v1.0.0 Recommendation 5.2.4.
  • Azure Backup Vault Without Infrastructure Encryption Enabled: Identifies backup vaults without infrastructure encryption.

New Query Filters

  • Azure File Share with NFS Not Configured as Root Squash: Filters for Azure File Shares lacking root squash configuration.
  • Verify NetApp Files Account Encryption Key Source: Filters NetApp Files accounts by encryption key source.
  • Recovery Services Vault Cross Subscription Restore State: Filters vaults by cross-subscription restore configuration.
  • Recovery Services Vault Public Network Access: Filters vaults by public network access settings.
  • Recovery Services Vault Infrastructure Encryption: Filters vaults by infrastructure encryption status.
  • Azure Backup Vaults Infrastructure Encryption: Filters backup vaults by infrastructure encryption configuration.

New Compliance Packs

  • Added the CIS Microsoft Azure Compute Services Benchmark 2.0.0 compliance pack.

Fixed

  • Fixed a bug where applying tags to S3 Buckets failed if the bucket contained AWS-managed tags.
  • Enhanced throttling protection for Bot Tagging action operations to resolve throttling errors when a bot matches against a high volume of resources.
  • Fixed an issue where delete actions for Azure Logic Apps triggered via ICS failed with errors for both Consumption and Standard plans. Delete operations now complete successfully across Logic App plan types.
  • Fixed an issue with unnamed series data in Compliance Overview Reporting graphs.
  • Fixed an issue where log_group_name for build projects was set to None if using default CloudWatch log group.
  • Fixed an issue where AliCloud NetworkHarvester did not collect tags for AliCloud VPC network resources, resulting in missing tags in ICS and the ResourceTags table.
  • Fixed an issue with AWSVolumeHarvesterRedux where the app column in an AWS volume ResourceTags table entry was not updated correctly if the value of the application tag key changed.
  • Added optional minimum_severity parameter to the get_insights method of resource objects for filtering matched insights to only include higher severity ones.
  • Updated Query Filters page so links to bots associated with a specific query filter properly filter the bot listing page.

Release of Kubernetes Scanner v5.0.2

  • Released with vulnerability fixes. Internal components and their versions are available in the chart value file.
    • View data using: helm show values <chart name> | grep -E 'Name:|Version:'
    • Update using helm upgrade --install command referenced in Kubernetes Scanner documentation

Top of page

Mimics Infrastructure as Code (IaC) Scanning Tool
Copy link

No updates released at this time.

Top of page

SIEM (InsightIDR)
Copy link

Improved:

  • Alert rendering performance optimized to reduce latency.
  • Investigation’s Endpoint Queries and Alert Payload information UI modernized.
  • User details now include associated admin groups across Identity Providers.

Top of page

Vulnerability Management (InsightVM)
Copy link

Version 8.43.0
Copy link

Software release date: Apr 20, 2026 | Release notes published: Apr 16, 2026

Improved:

  • Improved access control logic to ensure non-admin users only see sites they have permission to access across both the Assets page and the Scan History tab, providing a more secure and consistent user experience.
  • Updated the bundled Java runtime to the latest available Java 17 minor version, including an upgrade to the included Azul Zulu OpenJDK. This ensures improved stability, security, and alignment with current platform standards.

Fixed:

  • Resolved an issue affecting the accuracy of Cisco IOS XE fingerprinting, ensuring correct device identification.
  • Fixed an issue that caused false positives for certain VMware environments, including Cisco APIC devices, improving detection accuracy.
  • Addressed an issue where some AWS Discovery Connections failed and prevented configuration metadata from loading. Connections now load correctly and can be used as expected.
  • Resolved an issue impacting access to multi-silo consoles, restoring expected user access.
  • Fixed an issue where updates to custom scan templates via API did not persist to the underlying XML configuration files. Updates are now applied correctly.

Version 8.42.0
Copy link

Software release date: Apr 13, 2026 | Release notes published: Apr 9, 2026

New:

  • New Policy Content: Support has been added for the following versions of CIS and DISA STIG benchmarks to enable organizations to adhere to the latest security best practices:
    • DISA STIG F5 Big-IP TMOS VPN V1R1
    • DISA STIG Builtin Support for SUSE Linux Enterprise Server (SLES) 15 V2R7
    • DISA STIG Builtin Support for Google Chrome Browser for Windows V2R1
    • DISA STIG Builtin Support for Oracle Linux 9 V1R2
    • DISA STIG Red Hat Enterprise Linux 9 V2R7
    • CIS Benchmark - Add Builtin Support for Apple macOS 14.0 Sonoma Benchmark V3.0.0
    • CIS Benchmark Palo Alto firewalls 10 v1.3.0

Improved:

  • Policy Proof Readability (Dark Theme). Enhanced the display of policy proof details in dark mode to improve contrast and readability.
  • User Management Search Enhancements. Improved user search functionality to support lookup by first name or last name, making it easier to locate users in large environments.

Fixed:

  • Scan Assistant OS Detection. Addressed an issue impacting Scan Assistant fingerprinting accuracy, ensuring the correct operating system is identified under all conditions.
  • MOVEit Transfer Vulnerability Detection. Fixed a false positive for CVE-2023-46445 (Progress MOVEit Transfer). Assets are now correctly marked as not vulnerable once mitigation steps are applied.
  • Discovered Assets – Clear All Function. Resolved an issue affecting the “Clear All” delete function for large Sonar discovery connections. The operation now reliably removes all discovered assets at scale.
  • Dynamic Site Statistics Accuracy. Fixed an issue where negative VM counts could appear in Dynamic Site Statistics. Counts now accurately reflect targets after exclusions, even in complex configurations.
  • PostgreSQL Policy Scan Errors. Addressed a fingerprinting issue causing errors during policy scans of PostgreSQL instances hosted on Amazon RDS or Docker.
  • Resolved a false positive for rule 4.1.9 in the CIS Red Hat Enterprise Linux 7 Level 2 Server benchmark (v3.1.1).
  • Fixed errors in proof details for rules 5.1.5 and 5.1.7 in the CIS Ubuntu Linux 24.04 LTS benchmark, ensuring accurate and complete reporting.

Version 8.41.0
Copy link

Software release date: Apr 6, 2026 | Release notes published: Apr 2, 2026

Improved:

  • Upgraded Nmap to version 7.98, delivering improved CPU and memory efficiency during the scanning process. This will leverage previous optimizations to port data ingestion allowing for lighter XML processing, resulting in more efficient scan performance.
  • Updated APIv3 endpoint /api/3/scan_engines/{engine_id}/scans for engine pools to ensure complete scan history results are returned for all participating engines.

Fixed:

  • Addressed an OS fingerprinting issue where under certain conditions, a mismatch occurred for operating system details between the Security Console and Exposure Analytics. OS information is now consistent for newly assessed assets and will be corrected for existing affected assets after rescanning.
  • Addressed an issue causing failures when running the Perform Diagnostics function within the Security Console. This feature now executes as expected.

Top of page

Nexpose
Copy link

Nexpose version 8.43.0
Copy link

Software release date: Apr 20, 2026 | Release notes published: Apr 16, 2026

Improved:

  • Improved access control logic to ensure non-admin users only see sites they have permission to access across both the Assets page and the Scan History tab, providing a more secure and consistent user experience.
  • Updated the bundled Java runtime to the latest available Java 17 minor version, including an upgrade to the included Azul Zulu OpenJDK. This ensures improved stability, security, and alignment with current platform standards.

Fixed:

  • Resolved an issue affecting the accuracy of Cisco IOS XE fingerprinting, ensuring correct device identification.
  • Fixed an issue that caused false positives for certain VMware environments, including Cisco APIC devices, improving detection accuracy.
  • Addressed an issue where some AWS Discovery Connections failed and prevented configuration metadata from loading. Connections now load correctly and can be used as expected.
  • Resolved an issue impacting access to multi-silo consoles, restoring expected user access.
  • Fixed an issue where updates to custom scan templates via API did not persist to the underlying XML configuration files. Updates are now applied correctly.

Nexpose version 8.42.0
Copy link

Software release date: Apr 13, 2026 | Release notes published: Apr 9, 2026

New:

  • New Policy Content: Support has been added for the following versions of CIS and DISA STIG benchmarks to enable organizations to adhere to the latest security best practices:
    • DISA STIG F5 Big-IP TMOS VPN V1R1
    • DISA STIG Builtin Support for SUSE Linux Enterprise Server (SLES) 15 V2R7
    • DISA STIG Builtin Support for Google Chrome Browser for Windows V2R1
    • DISA STIG Builtin Support for Oracle Linux 9 V1R2
    • DISA STIG Red Hat Enterprise Linux 9 V2R7
    • CIS Benchmark - Add Builtin Support for Apple macOS 14.0 Sonoma Benchmark V3.0.0
    • CIS Benchmark Palo Alto firewalls 10 v1.3.0

Improved:

  • Policy Proof Readability (Dark Theme). Enhanced the display of policy proof details in dark mode to improve contrast and readability.
  • User Management Search Enhancements. Improved user search functionality to support lookup by first name or last name, making it easier to locate users in large environments.

Fixed:

  • Scan Assistant OS Detection. Addressed an issue impacting Scan Assistant fingerprinting accuracy, ensuring the correct operating system is identified under all conditions.
  • MOVEit Transfer Vulnerability Detection. Fixed a false positive for CVE-2023-46445 (Progress MOVEit Transfer). Assets are now correctly marked as not vulnerable once mitigation steps are applied.
  • Discovered Assets – Clear All Function. Resolved an issue affecting the “Clear All” delete function for large Sonar discovery connections. The operation now reliably removes all discovered assets at scale.
  • Dynamic Site Statistics Accuracy. Fixed an issue where negative VM counts could appear in Dynamic Site Statistics. Counts now accurately reflect targets after exclusions, even in complex configurations.
  • PostgreSQL Policy Scan Errors. Addressed a fingerprinting issue causing errors during policy scans of PostgreSQL instances hosted on Amazon RDS or Docker.
  • Resolved a false positive for rule 4.1.9 in the CIS Red Hat Enterprise Linux 7 Level 2 Server benchmark (v3.1.1).
  • Fixed errors in proof details for rules 5.1.5 and 5.1.7 in the CIS Ubuntu Linux 24.04 LTS benchmark, ensuring accurate and complete reporting.

Nexpose version 8.41.0
Copy link

Software release date: Apr 6, 2026 | Release notes published: Apr 2, 2026

Improved:

  • Upgraded Nmap to version 7.98, delivering improved CPU and memory efficiency during the scanning process. This will leverage previous optimizations to port data ingestion allowing for lighter XML processing, resulting in more efficient scan performance.
  • Updated APIv3 endpoint /api/3/scan_engines/{engine_id}/scans for engine pools to ensure complete scan history results are returned for all participating engines.

Fixed:

  • Addressed an issue causing failures when running the Perform Diagnostics function within the Security Console. This feature now executes as expected.

Top of page

Digital Risk Protection (Threat Command)
Copy link

No updates released at this time.

Top of page

Rapid7 Agent (Insight Agent)
Copy link

Version 4.1.0.2
Copy link

New:

  • Support for Upcoming On-Demand Vulnerability Scanning: This release introduces foundational support within the Agent for an upcoming on-demand vulnerability scanning capability. With this update, the Agent is now prepared to support ad-hoc scan requests, enabling real-time vulnerability assessments outside of the traditional scheduled scanning cadence to enable more flexible and responsive scanning workflows.

Improved:

  • Rapid7’s in-house fswalk command can now search for files with the .exe extension, improving coverage during assessments.

Fixed:

  • Rapid7 Agent data collection now correctly identifies Google Cloud Compute assets as virtual machines.
  • Removed use of the Python eval() function in Rapid7 Agent beaconing logic to eliminate potential exposure to remote code execution (CVE-2026-4837). Because the Agent uses mutual TLS (mTLS) to verify commands from the Rapid7 Platform, it is unlikely that the eval() function could be exploited remotely. Thanks to John Rodriguez from CyberDagger, LLC for reporting this issue.
  • Restricted specific Rapid7 Agent file paths on Windows installations to the SYSTEM user to prevent potential unauthorized access to sensitive files (CVE-2026-4482). Thanks to Peter Gabaldon @ ITRESIT  for reporting this issue.
  • Rapid7 Agent no longer attempts to load an OpenSSL file from a non-existent path in non-FIPs installations, preventing the possibility of loading arbitrary files (CVE-2026-6482). Thanks to Dell Security Assurance for reporting this issue.
  • Updated the Python cryptography library to version 46.0.5 to address CVE-2026-26007.
  • Resolved an OpenSSL integration issue with the applink.c function that prevented application execution in certain Windows environments.

Updated Operating System Support:

  • As of version 4.1.0.2, the Rapid7 Agent (Insight Agent) no longer supports the following operating systems for any architecture:

    • Ubuntu 16.04
    • SUSE Enterprise 15.2/15 SP2

Top of page

Next-Generation Antivirus
Copy link

Software release date: April 21, 2026 | Release notes published: April 21, 2026

Understand blocked activity with Endpoint Security Notifications
Copy link

Endpoint Security Notifications provide real-time, on-device alerts when the Rapid7 Agent (Insight Agent) blocks or prevents malicious activity using Ransomware Prevention or Next-Generation Antivirus (NGAV). This feature helps users understand why activity was stopped without needing to access the Insight Platform.

With this capability, you can:

  • Display system tray notifications when a file or process is blocked or prevented
  • Show custom messages on Windows assets to provide additional context
  • Improve user awareness of endpoint protection actions in real time

Endpoint Security Notifications are disabled by default and are available only on Windows assets with Ransomware Prevention or NGAV installed. Visit the documentation .

Impacted offerings:

  • Managed Threat Complete
  • Managed Detection and Response
  • Incident Command

Where:

Data Connectors > Agents > Organization Settings > Endpoint Security Notifications.

Top of page

Ransomware Prevention
Copy link

Software release date: April 21, 2026 | Release notes published: April 21, 2026

Understand blocked activity with Endpoint Security Notifications
Copy link

Endpoint Security Notifications provide real-time, on-device alerts when the Rapid7 Agent (Insight Agent) blocks or prevents malicious activity using Ransomware Prevention or Next-Generation Antivirus (NGAV). This feature helps users understand why activity was stopped without needing to access the Insight Platform.

With this capability, you can:

  • Display system tray notifications when a file or process is blocked or prevented
  • Show custom messages on Windows assets to provide additional context
  • Improve user awareness of endpoint protection actions in real time

Endpoint Security Notifications are disabled by default and are available only on Windows assets with Ransomware Prevention or NGAV installed. Visit the documentation .

Impacted offerings:

  • Managed Threat Complete
  • Managed Detection and Response
  • Incident Command

Where:

Data Connectors > Agents > Organization Settings > Endpoint Security Notifications.

Top of page

Velociraptor
Copy link

No updates released at this time.

Top of page