Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32596: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in nicolargo glances

0
High
VulnerabilityCVE-2026-32596cvecve-2026-32596cwe-200
Published: Wed Mar 18 2026 (03/18/2026, 05:18:11 UTC)
Source: CVE Database V5
Vendor/Project: nicolargo
Product: glances

Description

CVE-2026-32596 is a high-severity vulnerability in the open-source system monitoring tool Glances prior to version 4. 5. 2. When started with the web server option (`glances -w`), the application runs without authentication by default, exposing a REST API that leaks sensitive system information. This includes process command lines that may contain credentials such as passwords, API keys, and tokens. The vulnerability allows any network client to access this information without authentication or user interaction. Version 4. 5. 2 addresses this issue by introducing authentication or restricting access. The vulnerability has a CVSS 4.

AI-Powered Analysis

AILast updated: 03/18/2026, 16:27:52 UTC

Technical Analysis

Glances is a widely used open-source cross-platform system monitoring tool that provides real-time information about system metrics and processes. Prior to version 4.5.2, when Glances is launched with the web server option (`glances -w`), it starts a REST API server without any authentication mechanism by default. This design flaw exposes sensitive system information to any client that can reach the server over the network. Critically, the exposed data includes process command lines, which often contain sensitive credentials such as passwords, API keys, and tokens embedded in scripts or commands. Because the API is accessible without authentication, any unauthorized actor on the network can retrieve this information, leading to a significant confidentiality breach. The vulnerability is tracked as CVE-2026-32596 and classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS 4.0 base score is 8.7, reflecting the ease of exploitation (network accessible, no authentication or user interaction required) and the high impact on confidentiality. The vulnerability affects all Glances versions prior to 4.5.2. The fix in version 4.5.2 introduces authentication or access controls to prevent unauthorized access to the REST API. No public exploits have been reported yet, but the risk remains high due to the nature of the exposed data and the default insecure configuration.

Potential Impact

The exposure of sensitive system information including credentials can have severe consequences for organizations. Attackers gaining access to passwords, API keys, or tokens can escalate privileges, move laterally within networks, or compromise additional systems and services. This can lead to data breaches, unauthorized access to critical infrastructure, and potential disruption of operations. Since Glances is used for system monitoring across various platforms, the vulnerability could affect servers, cloud instances, and development environments globally. The lack of authentication means that any attacker with network access to the Glances web server can exploit the vulnerability without needing to compromise user credentials or trick users into interaction. This significantly lowers the barrier to exploitation and increases the likelihood of successful attacks, especially in environments where network segmentation is weak or where Glances is exposed to untrusted networks. The confidentiality impact is high, while integrity and availability impacts are minimal or none. Organizations relying on Glances for monitoring should consider the risk of credential leakage and subsequent attacks.

Mitigation Recommendations

The primary mitigation is to upgrade Glances to version 4.5.2 or later, which fixes the vulnerability by implementing authentication or restricting access to the REST API. Until the upgrade can be applied, organizations should take immediate steps to restrict network access to the Glances web server interface. This includes firewall rules limiting access to trusted IP addresses, using VPNs or secure tunnels for remote access, and disabling the web server mode if not strictly necessary. Additionally, review and rotate any credentials, API keys, or tokens that may have been exposed through this vulnerability. Implement network segmentation to isolate monitoring tools from untrusted networks. Monitoring network traffic for unusual access patterns to the Glances web server can help detect potential exploitation attempts. Finally, educate system administrators about the risks of running monitoring tools with default insecure configurations and encourage the use of secure deployment practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-12T14:54:24.269Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bacf27771bdb1749ad833a

Added to database: 3/18/2026, 4:13:27 PM

Last enriched: 3/18/2026, 4:27:52 PM

Last updated: 3/18/2026, 5:30:19 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses