Impact
The vulnerability in Glances allows a local network attacker to spoof a Zeroconf advertisement for a Glances server. Glances incorrectly uses the untrusted advertised name to build connection URIs and to look up stored credentials for protected servers. This behavior results in Glances automatically sending a reusable authentication secret to the attacker-controlled host. The impact is the disclosure of authentication credentials that can grant unauthorized access to the Glances system. The weakness can be classified as CWE-346 and CWE-522.
Affected Systems
Affected systems include the open-source Glances monitoring tool from the vendor nicolargo. Versions prior to 4.5.2 are vulnerable. The issue was addressed in release 4.5.2, which corrects the use of the advertised name in connection logic.
Risk and Exploitability
The vulnerability carries a CVSS score of 8.1, indicating high severity, while the EPSS score is below 1% and the issue is not currently listed in the CISA KEV catalogue. Exploitation requires the attacker to be on the same local network and to advertise a fake Glances service via Zeroconf. Because the attack vector is limited to a local network and the probability of exploitation is low, the risk is moderate to high for environments where Glances Central Browser mode is enabled and exposed to untrusted local networks. Prompt patching and network segmentation are advisable.
OpenCVE Enrichment
Github GHSA