Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28377: Vulnerability in Grafana Tempo

0
High
VulnerabilityCVE-2026-28377cvecve-2026-28377
Published: Thu Mar 26 2026 (03/26/2026, 21:39:46 UTC)
Source: CVE Database V5
Vendor/Project: Grafana
Product: Tempo

Description

CVE-2026-28377 is a high-severity vulnerability in Grafana Tempo version 2. 10. 3 that exposes the S3 SSE-C encryption key in plaintext via the /status/config endpoint. This exposure allows unauthorized remote attackers to obtain the key used to encrypt trace data stored in S3, compromising confidentiality. The vulnerability requires no authentication or user interaction and can be exploited over the network. While no known exploits are currently in the wild, the impact on confidentiality is significant. Organizations using Grafana Tempo with SSE-C encryption for trace data storage on S3 should prioritize patching or mitigating this issue. The vulnerability affects environments globally but is especially critical for organizations in countries with high adoption of Grafana Tempo and cloud infrastructure. Immediate mitigation steps include restricting access to the /status/config endpoint, rotating encryption keys, and monitoring for suspicious access. This vulnerability has a CVSS score of 7.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 22:14:52 UTC

Technical Analysis

CVE-2026-28377 is a vulnerability identified in Grafana Tempo version 2.10.3 that exposes the server-side encryption customer-provided (SSE-C) key used for encrypting trace data stored in Amazon S3. The vulnerability manifests through the /status/config HTTP endpoint, which inadvertently returns the SSE-C encryption key in plaintext. This endpoint is accessible without authentication or user interaction, allowing any remote attacker with network access to retrieve the encryption key. The SSE-C key is critical for decrypting trace data stored in S3 buckets, meaning that exposure of this key compromises the confidentiality of all trace data encrypted with it. The vulnerability does not affect data integrity or availability directly but poses a significant confidentiality risk. The CVSS v3.1 base score is 7.5, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, and high impact on confidentiality. No known exploits have been reported in the wild as of the publication date. The vulnerability was responsibly disclosed by security researcher william_goodfellow and published on March 26, 2026. Grafana Tempo is an open-source distributed tracing backend widely used for observability in cloud-native environments, often integrated with Kubernetes and cloud storage solutions like Amazon S3. The exposure of SSE-C keys can lead to unauthorized decryption of sensitive telemetry data, potentially revealing internal system behaviors, user activity, or other sensitive operational information.

Potential Impact

The primary impact of CVE-2026-28377 is the compromise of confidentiality for organizations using Grafana Tempo with SSE-C encryption for trace data stored in S3. Unauthorized disclosure of the SSE-C key enables attackers to decrypt sensitive trace data, which may contain detailed telemetry and operational insights. This can lead to information leakage about internal system architecture, user behavior, or security posture, potentially aiding further attacks or industrial espionage. Since the vulnerability requires no authentication and can be exploited remotely, the attack surface is broad, especially in environments where the /status/config endpoint is exposed to untrusted networks. Although there is no direct impact on data integrity or availability, the loss of confidentiality alone is significant for organizations relying on trace data for security monitoring and compliance. The vulnerability could also undermine trust in observability infrastructure and complicate incident response efforts. Organizations in sectors with stringent data privacy requirements or those handling sensitive operational data are at elevated risk. The absence of known exploits in the wild suggests limited immediate threat, but the ease of exploitation and sensitive nature of the data warrant urgent remediation.

Mitigation Recommendations

To mitigate CVE-2026-28377, organizations should first apply any available patches or updates from Grafana addressing this vulnerability; if no patch is currently available, consider upgrading to a fixed version once released. Restrict network access to the /status/config endpoint by implementing strict firewall rules, network segmentation, or API gateway controls to ensure only trusted administrators can reach this endpoint. Disable or restrict the /status/config endpoint if it is not necessary for operational monitoring. Rotate the SSE-C encryption keys immediately to invalidate any potentially exposed keys, and update the key management procedures to prevent future exposure. Implement monitoring and alerting on access to the /status/config endpoint and unusual S3 access patterns to detect potential exploitation attempts. Review and harden the overall Grafana Tempo deployment, including authentication and authorization mechanisms for administrative endpoints. Consider transitioning to alternative encryption methods such as SSE-KMS or SSE-S3 if feasible, which may not expose keys in the same manner. Conduct a thorough audit of trace data access and encryption key management policies to ensure compliance with security best practices. Finally, educate DevOps and security teams about this vulnerability to raise awareness and ensure rapid response to any suspicious activity.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GRAFANA
Date Reserved
2026-02-27T07:16:12.218Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c5ac523c064ed76fd41c44

Added to database: 3/26/2026, 9:59:46 PM

Last enriched: 3/26/2026, 10:14:52 PM

Last updated: 3/26/2026, 11:05:14 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses