Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vx5f-957p-qpvm | Glances Central Browser Autodiscovery Leaks Reusable Credentials to Zeroconf-Spoofed Servers |
Thu, 19 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:nicolargo:glances:*:*:*:*:*:*:*:* |
Thu, 19 Mar 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nicolargo
Nicolargo glances |
|
| Vendors & Products |
Nicolargo
Nicolargo glances |
Wed, 18 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.2, in Central Browser mode, Glances stores both the Zeroconf-advertised server name and the discovered IP address for dynamic servers, but later builds connection URIs from the untrusted advertised name instead of the discovered IP. When a dynamic server reports itself as protected, Glances also uses that same untrusted name as the lookup key for saved passwords and the global `[passwords] default` credential. An attacker on the same local network can advertise a fake Glances service over Zeroconf and cause the browser to automatically send a reusable Glances authentication secret to an attacker-controlled host. This affects the background polling path and the REST/WebUI click-through path in Central Browser mode. Version 4.5.2 fixes the issue. | |
| Title | Glances Central Browser Autodiscovery Leaks Reusable Credentials to Zeroconf-Spoofed Servers | |
| Weaknesses | CWE-346 CWE-522 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-18T18:36:07.432Z
Reserved: 2026-03-12T15:29:36.559Z
Link: CVE-2026-32634
Updated: 2026-03-18T18:35:59.754Z
Status : Analyzed
Published: 2026-03-18T18:16:29.097
Modified: 2026-03-19T19:03:47.010
Link: CVE-2026-32634
No data.
OpenCVE Enrichment
Updated: 2026-03-24T10:58:05Z
Github GHSA