Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32634: CWE-346: Origin Validation Error in nicolargo glances

0
High
VulnerabilityCVE-2026-32634cvecve-2026-32634cwe-346cwe-522
Published: Wed Mar 18 2026 (03/18/2026, 17:55:30 UTC)
Source: CVE Database V5
Vendor/Project: nicolargo
Product: glances

Description

Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.2, in Central Browser mode, Glances stores both the Zeroconf-advertised server name and the discovered IP address for dynamic servers, but later builds connection URIs from the untrusted advertised name instead of the discovered IP. When a dynamic server reports itself as protected, Glances also uses that same untrusted name as the lookup key for saved passwords and the global `[passwords] default` credential. An attacker on the same local network can advertise a fake Glances service over Zeroconf and cause the browser to automatically send a reusable Glances authentication secret to an attacker-controlled host. This affects the background polling path and the REST/WebUI click-through path in Central Browser mode. Version 4.5.2 fixes the issue.

AI-Powered Analysis

AILast updated: 03/18/2026, 19:12:42 UTC

Technical Analysis

Glances is a widely used open-source cross-platform system monitoring tool that supports a Central Browser mode to discover and monitor dynamic servers via Zeroconf (mDNS) service advertisements. Prior to version 4.5.2, Glances stores both the Zeroconf-advertised server name and the discovered IP address for dynamic servers. However, when building connection URIs and retrieving stored passwords, it uses the untrusted advertised server name instead of the verified IP address. This origin validation error (CWE-346) combined with improper credential storage and usage (CWE-522) enables an attacker on the same local network to advertise a fake Glances service. Because the client trusts the advertised name, it sends stored reusable authentication secrets, including the global default password, to the attacker-controlled host automatically, without requiring user interaction or prior authentication. This affects both the background polling mechanism and the REST/WebUI click-through access path in Central Browser mode. The vulnerability has a CVSS 3.1 base score of 8.1 (high severity), reflecting high confidentiality and integrity impact, low attack complexity, no privileges required, and no user interaction needed. Although no known exploits are currently reported in the wild, the flaw poses a significant risk in local network environments where attackers can perform Zeroconf spoofing. The issue was addressed in Glances version 4.5.2 by ensuring connection URIs and credential lookups use the discovered IP address rather than the untrusted advertised name, thereby preventing credential leakage to rogue services.

Potential Impact

This vulnerability allows an attacker on the same local network to impersonate legitimate Glances servers by advertising fake Zeroconf services. As a result, the Glances Central Browser client may send stored authentication secrets, including reusable passwords, to the attacker-controlled host. This leads to a complete compromise of confidentiality and integrity of monitored system data and potentially unauthorized control over monitored systems. Since the attack requires local network access, it primarily threatens organizations with flat or poorly segmented internal networks, such as enterprises, data centers, and managed service providers. The vulnerability affects both automated background polling and interactive user sessions, increasing the attack surface. While availability is not directly impacted, the attacker could leverage stolen credentials for further lateral movement or data exfiltration. The lack of required privileges or user interaction makes exploitation relatively easy for local attackers. Organizations relying on Glances for system monitoring without proper network segmentation or updated versions risk exposure of sensitive operational data and credentials to malicious insiders or compromised devices.

Mitigation Recommendations

1. Upgrade all Glances installations to version 4.5.2 or later immediately to apply the official fix that enforces use of verified IP addresses for connection URIs and credential lookups. 2. Restrict Zeroconf/mDNS traffic on local networks using VLAN segmentation, firewall rules, or network access controls to limit exposure to rogue advertisements. 3. Monitor network traffic for unexpected or suspicious Zeroconf service advertisements that do not correspond to authorized Glances servers. 4. Avoid storing reusable global default passwords in Glances configurations; use unique, per-server credentials where possible. 5. Implement network-level authentication and encryption (e.g., VPNs, TLS) for Glances communications to reduce reliance on Zeroconf discovery and mitigate credential interception risks. 6. Educate system administrators about the risks of trusting unverified service advertisements and the importance of applying security patches promptly. 7. Consider disabling Central Browser mode if not required or restricting its use to trusted network segments only.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-12T15:29:36.559Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69baf5d2771bdb1749bce2c2

Added to database: 3/18/2026, 6:58:26 PM

Last enriched: 3/18/2026, 7:12:42 PM

Last updated: 3/18/2026, 8:01:32 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses