CVE-2026-32596 - Vulnerability Analysis
HighCVSS: 7.5Last Updated: March 18, 2026
Glances - Information Disclosure
Overview
Glances < 4.5.2 contains an information disclosure vulnerability caused by the web server running without authentication by default, letting remote attackers access sensitive system information including credentials, exploit requires no special privileges.
Severity & Score
Impact
Remote attackers can access sensitive system information including credentials, risking data exposure and system compromise.
Mitigation
Update to version 4.5.2 or later.
References
Social Media Activity(2 posts)
š CVE-2026-32596 - High (7.5) Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.2, Glances web server runs without authentication by default when started with `glances -w`, exposing REST API with sensitive system information including process comman... š https://www.thehackerwire.com/vulnerability/CVE-2026-32596/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš CVE-2026-32596 - High (7.5) Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.2, Glances web server runs without authentication by default when started with `glances -w`, exposing REST API with sensitive system information including process comman... š https://www.thehackerwire.com/vulnerability/CVE-2026-32596/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-32596
- Severity
- High
- CVSS Score
- 7.5
- Type
- broken_authentication
- Status
- confirmed
- EPSS
- 6.8%
- Social Posts
- 2
CWE
- CWE-200
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N