Cyber Posture

CVE-2026-32596

HighPublic PoC

Published: 18 March 2026

Published
18 March 2026
Modified
18 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0520 90.0th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32596 is a high-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability in Nicolargo Glances. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 10.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and CM-6 (Configuration Settings).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 3 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly identifies and restricts actions like accessing sensitive REST API endpoints that can be performed without identification or authentication, preventing exposure to any network client.

prevent

Enforces secure configuration settings for the Glances web server to require authentication, countering the default unauthenticated exposure of sensitive system information.

prevent

Prohibits or restricts unnecessary functions such as the unauthenticated web server mode, minimizing the attack surface for sensitive process command-line data leakage.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
T1082 System Information Discovery Discovery
An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture.
T1057 Process Discovery Discovery
Adversaries may attempt to get information about running processes on a system.
Why these techniques?

Unauthenticated network exposure of the Glances REST API directly enables remote exploitation of a public-facing monitoring service (T1190) to retrieve system/process data (T1082/T1057) that contains credentials (T1552).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.2, Glances web server runs without authentication by default when started with `glances -w`, exposing REST API with sensitive system information including process command-lines containing credentials (passwords, API keys, tokens)…

more

to any network client. Version 4.5.2 fixes the issue.

Deeper analysisAI

CVE-2026-32596 is an exposure of sensitive information vulnerability (CWE-200) in Glances, an open-source cross-platform system monitoring tool. In versions prior to 4.5.2, the Glances web server runs without authentication by default when started with the `glances -w` command. This exposes a REST API to any network client, providing access to sensitive system information, including process command lines that may contain credentials such as passwords, API keys, and tokens. The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with no requirements for privileges or user interaction.

Any unauthenticated attacker with network access to the affected host can exploit this vulnerability by directly querying the exposed REST API endpoints. Successful exploitation allows retrieval of detailed system monitoring data, including command-line arguments from running processes that disclose sensitive credentials and other confidential information hosted on the system.

Version 4.5.2 of Glances fixes this issue. Security practitioners should upgrade to this version or later. Additional details are available in the GitHub security advisory at https://github.com/nicolargo/glances/security/advisories/GHSA-wvxv-4j8q-4wjq, the release notes at https://github.com/nicolargo/glances/releases/tag/v4.5.2, and the fixing commit at https://github.com/nicolargo/glances/commit/208d876118fea5758970f33fd7474908bd403d25.

Details

CWE(s)

Affected Products

nicolargo
glances
≤ 4.5.2

CVEs Like This One

CVE-2026-32609Same product: Nicolargo Glances
CVE-2026-30928Same product: Nicolargo Glances
CVE-2026-32633Same product: Nicolargo Glances
CVE-2026-32611Same product: Nicolargo Glances
CVE-2026-30930Same product: Nicolargo Glances
CVE-2026-32610Same product: Nicolargo Glances
CVE-2026-35587Same product: Nicolargo Glances
CVE-2026-32634Same product: Nicolargo Glances
CVE-2026-33641Same product: Nicolargo Glances
CVE-2026-4020Shared CWE-200

References