Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32609: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in nicolargo glances

0
High
VulnerabilityCVE-2026-32609cvecve-2026-32609cwe-200
Published: Wed Mar 18 2026 (03/18/2026, 14:30:37 UTC)
Source: CVE Database V5
Vendor/Project: nicolargo
Product: glances

Description

Glances is an open-source system cross-platform monitoring tool. The GHSA-gh4x fix (commit 5d3de60) addressed unauthenticated configuration secrets exposure on the `/api/v4/config` endpoints by introducing `as_dict_secure()` redaction. However, the `/api/v4/args` and `/api/v4/args/{item}` endpoints were not addressed by this fix. These endpoints return the complete command-line arguments namespace via `vars(self.args)`, which includes the password hash (salt + pbkdf2_hmac), SNMP community strings, SNMP authentication keys, and the configuration file path. When Glances runs without `--password` (the default), these endpoints are accessible without any authentication. Version 4.5.2 provides a more complete fix.

AI-Powered Analysis

AILast updated: 03/18/2026, 14:58:09 UTC

Technical Analysis

Glances is a cross-platform system monitoring tool widely used for real-time system metrics and diagnostics. In versions prior to 4.5.2, a vulnerability identified as CVE-2026-32609 allows unauthenticated remote attackers to retrieve sensitive configuration information via the /api/v4/args and /api/v4/args/{item} REST API endpoints. These endpoints return the full command-line arguments namespace by exposing vars(self.args), which includes critical secrets such as the password hash (comprising salt and pbkdf2_hmac), SNMP community strings, SNMP authentication keys, and the configuration file path. The issue arises because when Glances is run without the --password option (which is the default), these endpoints do not require authentication, thus exposing sensitive data to any network user. This vulnerability is a form of CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). Previously, a fix was applied to the /api/v4/config endpoint to redact secrets via as_dict_secure(), but the /api/v4/args endpoints were not similarly protected until version 4.5.2. The CVSS v3.1 score of 7.5 reflects that the vulnerability is remotely exploitable without authentication or user interaction and results in a high confidentiality impact, though it does not affect integrity or availability. No public exploits have been reported so far, but the sensitive nature of the exposed data makes this a significant risk. The vulnerability affects all Glances installations running versions earlier than 4.5.2, especially those deployed in network-accessible environments without password protection enabled.

Potential Impact

The primary impact of CVE-2026-32609 is the unauthorized disclosure of sensitive configuration secrets, including password hashes and SNMP credentials. This exposure can enable attackers to perform further attacks such as credential cracking, unauthorized SNMP access, or lateral movement within the network. Since the vulnerability requires no authentication and no user interaction, any attacker with network access to the Glances API endpoints can exploit it. Organizations relying on Glances for system monitoring in production or sensitive environments risk leaking critical secrets that could compromise system security and privacy. The exposure of password hashes and SNMP keys may lead to privilege escalation or unauthorized monitoring and control of network devices. Although the vulnerability does not directly impact system integrity or availability, the confidentiality breach can have cascading effects on overall security posture. The risk is heightened in environments where Glances is exposed to untrusted networks or the internet without proper access controls. The absence of known exploits in the wild suggests limited active exploitation currently, but the vulnerability's characteristics make it a likely target for attackers once widely known.

Mitigation Recommendations

To mitigate CVE-2026-32609, organizations should immediately upgrade all Glances installations to version 4.5.2 or later, where the vulnerability is fully addressed by securing the /api/v4/args endpoints and redacting sensitive information. Until upgrades can be performed, administrators should enable the --password option to enforce authentication on the API endpoints, preventing unauthenticated access. Additionally, network-level controls such as firewall rules or VPNs should be used to restrict access to Glances API endpoints to trusted users only. Monitoring and logging access to these endpoints can help detect any unauthorized attempts. It is also advisable to rotate any exposed credentials, such as SNMP community strings and password hashes, if there is suspicion of compromise. Reviewing and minimizing the exposure of monitoring tools like Glances on public or untrusted networks reduces attack surface. Finally, organizations should audit their use of Glances and ensure that sensitive configuration data is not unnecessarily exposed through APIs or logs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-12T14:54:24.270Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69baba10771bdb1749a5df7e

Added to database: 3/18/2026, 2:43:28 PM

Last enriched: 3/18/2026, 2:58:09 PM

Last updated: 3/19/2026, 5:39:50 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses