Bug 2448748 (CVE-2026-32634) - CVE-2026-32634 glances: Central Browser autodiscovery leaks reusable credentials to Zeroconf-spoofed servers
Summary: CVE-2026-32634 glances: Central Browser autodiscovery leaks reusable credenti...
Keywords:
Status: NEW
Alias: CVE-2026-32634
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2448766 2448767
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-18 19:03 UTC by OSIDB Bzimport
Modified: 2026-03-23 20:52 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-03-18 19:03:02 UTC
Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.2, in Central Browser mode, Glances stores both the Zeroconf-advertised server name and the discovered IP address for dynamic servers, but later builds connection URIs from the untrusted advertised name instead of the discovered IP. When a dynamic server reports itself as protected, Glances also uses that same untrusted name as the lookup key for saved passwords and the global `[passwords] default` credential. An attacker on the same local network can advertise a fake Glances service over Zeroconf and cause the browser to automatically send a reusable Glances authentication secret to an attacker-controlled host. This affects the background polling path and the REST/WebUI click-through path in Central Browser mode. Version 4.5.2 fixes the issue.


Note You need to log in before you can comment on or make changes to this bug.