CVE-2026-28377: Vulnerability in Grafana Tempo
CVE-2026-28377 is a high-severity vulnerability in Grafana Tempo version 2. 10. 3 that exposes the S3 SSE-C encryption key in plaintext via the /status/config endpoint. This exposure allows unauthorized remote attackers to obtain the key used to encrypt trace data stored in S3, compromising confidentiality. The vulnerability requires no authentication or user interaction and can be exploited over the network. While no known exploits are currently in the wild, the impact on confidentiality is significant. Organizations using Grafana Tempo with SSE-C encryption for trace data storage on S3 should prioritize patching or mitigating this issue. The vulnerability affects environments globally but is especially critical for organizations in countries with high adoption of Grafana Tempo and cloud infrastructure. Immediate mitigation steps include restricting access to the /status/config endpoint, rotating encryption keys, and monitoring for suspicious access. This vulnerability has a CVSS score of 7.
AI Analysis
Technical Summary
CVE-2026-28377 is a vulnerability identified in Grafana Tempo version 2.10.3 that exposes the server-side encryption customer-provided (SSE-C) key used for encrypting trace data stored in Amazon S3. The vulnerability manifests through the /status/config HTTP endpoint, which inadvertently returns the SSE-C encryption key in plaintext. This endpoint is accessible without authentication or user interaction, allowing any remote attacker with network access to retrieve the encryption key. The SSE-C key is critical for decrypting trace data stored in S3 buckets, meaning that exposure of this key compromises the confidentiality of all trace data encrypted with it. The vulnerability does not affect data integrity or availability directly but poses a significant confidentiality risk. The CVSS v3.1 base score is 7.5, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, and high impact on confidentiality. No known exploits have been reported in the wild as of the publication date. The vulnerability was responsibly disclosed by security researcher william_goodfellow and published on March 26, 2026. Grafana Tempo is an open-source distributed tracing backend widely used for observability in cloud-native environments, often integrated with Kubernetes and cloud storage solutions like Amazon S3. The exposure of SSE-C keys can lead to unauthorized decryption of sensitive telemetry data, potentially revealing internal system behaviors, user activity, or other sensitive operational information.
Potential Impact
The primary impact of CVE-2026-28377 is the compromise of confidentiality for organizations using Grafana Tempo with SSE-C encryption for trace data stored in S3. Unauthorized disclosure of the SSE-C key enables attackers to decrypt sensitive trace data, which may contain detailed telemetry and operational insights. This can lead to information leakage about internal system architecture, user behavior, or security posture, potentially aiding further attacks or industrial espionage. Since the vulnerability requires no authentication and can be exploited remotely, the attack surface is broad, especially in environments where the /status/config endpoint is exposed to untrusted networks. Although there is no direct impact on data integrity or availability, the loss of confidentiality alone is significant for organizations relying on trace data for security monitoring and compliance. The vulnerability could also undermine trust in observability infrastructure and complicate incident response efforts. Organizations in sectors with stringent data privacy requirements or those handling sensitive operational data are at elevated risk. The absence of known exploits in the wild suggests limited immediate threat, but the ease of exploitation and sensitive nature of the data warrant urgent remediation.
Mitigation Recommendations
To mitigate CVE-2026-28377, organizations should first apply any available patches or updates from Grafana addressing this vulnerability; if no patch is currently available, consider upgrading to a fixed version once released. Restrict network access to the /status/config endpoint by implementing strict firewall rules, network segmentation, or API gateway controls to ensure only trusted administrators can reach this endpoint. Disable or restrict the /status/config endpoint if it is not necessary for operational monitoring. Rotate the SSE-C encryption keys immediately to invalidate any potentially exposed keys, and update the key management procedures to prevent future exposure. Implement monitoring and alerting on access to the /status/config endpoint and unusual S3 access patterns to detect potential exploitation attempts. Review and harden the overall Grafana Tempo deployment, including authentication and authorization mechanisms for administrative endpoints. Consider transitioning to alternative encryption methods such as SSE-KMS or SSE-S3 if feasible, which may not expose keys in the same manner. Conduct a thorough audit of trace data access and encryption key management policies to ensure compliance with security best practices. Finally, educate DevOps and security teams about this vulnerability to raise awareness and ensure rapid response to any suspicious activity.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, Japan, France, India, South Korea
CVE-2026-28377: Vulnerability in Grafana Tempo
Description
CVE-2026-28377 is a high-severity vulnerability in Grafana Tempo version 2. 10. 3 that exposes the S3 SSE-C encryption key in plaintext via the /status/config endpoint. This exposure allows unauthorized remote attackers to obtain the key used to encrypt trace data stored in S3, compromising confidentiality. The vulnerability requires no authentication or user interaction and can be exploited over the network. While no known exploits are currently in the wild, the impact on confidentiality is significant. Organizations using Grafana Tempo with SSE-C encryption for trace data storage on S3 should prioritize patching or mitigating this issue. The vulnerability affects environments globally but is especially critical for organizations in countries with high adoption of Grafana Tempo and cloud infrastructure. Immediate mitigation steps include restricting access to the /status/config endpoint, rotating encryption keys, and monitoring for suspicious access. This vulnerability has a CVSS score of 7.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-28377 is a vulnerability identified in Grafana Tempo version 2.10.3 that exposes the server-side encryption customer-provided (SSE-C) key used for encrypting trace data stored in Amazon S3. The vulnerability manifests through the /status/config HTTP endpoint, which inadvertently returns the SSE-C encryption key in plaintext. This endpoint is accessible without authentication or user interaction, allowing any remote attacker with network access to retrieve the encryption key. The SSE-C key is critical for decrypting trace data stored in S3 buckets, meaning that exposure of this key compromises the confidentiality of all trace data encrypted with it. The vulnerability does not affect data integrity or availability directly but poses a significant confidentiality risk. The CVSS v3.1 base score is 7.5, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, and high impact on confidentiality. No known exploits have been reported in the wild as of the publication date. The vulnerability was responsibly disclosed by security researcher william_goodfellow and published on March 26, 2026. Grafana Tempo is an open-source distributed tracing backend widely used for observability in cloud-native environments, often integrated with Kubernetes and cloud storage solutions like Amazon S3. The exposure of SSE-C keys can lead to unauthorized decryption of sensitive telemetry data, potentially revealing internal system behaviors, user activity, or other sensitive operational information.
Potential Impact
The primary impact of CVE-2026-28377 is the compromise of confidentiality for organizations using Grafana Tempo with SSE-C encryption for trace data stored in S3. Unauthorized disclosure of the SSE-C key enables attackers to decrypt sensitive trace data, which may contain detailed telemetry and operational insights. This can lead to information leakage about internal system architecture, user behavior, or security posture, potentially aiding further attacks or industrial espionage. Since the vulnerability requires no authentication and can be exploited remotely, the attack surface is broad, especially in environments where the /status/config endpoint is exposed to untrusted networks. Although there is no direct impact on data integrity or availability, the loss of confidentiality alone is significant for organizations relying on trace data for security monitoring and compliance. The vulnerability could also undermine trust in observability infrastructure and complicate incident response efforts. Organizations in sectors with stringent data privacy requirements or those handling sensitive operational data are at elevated risk. The absence of known exploits in the wild suggests limited immediate threat, but the ease of exploitation and sensitive nature of the data warrant urgent remediation.
Mitigation Recommendations
To mitigate CVE-2026-28377, organizations should first apply any available patches or updates from Grafana addressing this vulnerability; if no patch is currently available, consider upgrading to a fixed version once released. Restrict network access to the /status/config endpoint by implementing strict firewall rules, network segmentation, or API gateway controls to ensure only trusted administrators can reach this endpoint. Disable or restrict the /status/config endpoint if it is not necessary for operational monitoring. Rotate the SSE-C encryption keys immediately to invalidate any potentially exposed keys, and update the key management procedures to prevent future exposure. Implement monitoring and alerting on access to the /status/config endpoint and unusual S3 access patterns to detect potential exploitation attempts. Review and harden the overall Grafana Tempo deployment, including authentication and authorization mechanisms for administrative endpoints. Consider transitioning to alternative encryption methods such as SSE-KMS or SSE-S3 if feasible, which may not expose keys in the same manner. Conduct a thorough audit of trace data access and encryption key management policies to ensure compliance with security best practices. Finally, educate DevOps and security teams about this vulnerability to raise awareness and ensure rapid response to any suspicious activity.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GRAFANA
- Date Reserved
- 2026-02-27T07:16:12.218Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c5ac523c064ed76fd41c44
Added to database: 3/26/2026, 9:59:46 PM
Last enriched: 3/26/2026, 10:14:52 PM
Last updated: 3/26/2026, 11:05:14 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.