The CTFer.io Monitoring component is in charge of the collection, process and storage of various signals (i.e. logs, metrics and distributed traces). Prior to 0.2.1, due to a mis-written NetworkPolicy, a malicious actor can pivot from a component to any other namespace. This breaks the security-by-default property expected as part of the deployment program, leading to a potential lateral movement. This vulnerability is fixed in 0.2.1.
History

Mon, 16 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Ctfer-io
Ctfer-io monitoring
Vendors & Products Ctfer-io
Ctfer-io monitoring

Fri, 13 Mar 2026 21:45:00 +0000

Type Values Removed Values Added
Description The CTFer.io Monitoring component is in charge of the collection, process and storage of various signals (i.e. logs, metrics and distributed traces). Prior to 0.2.1, due to a mis-written NetworkPolicy, a malicious actor can pivot from a component to any other namespace. This breaks the security-by-default property expected as part of the deployment program, leading to a potential lateral movement. This vulnerability is fixed in 0.2.1.
Title Improper Access Control in github.com/ctfer-io/monitoring
Weaknesses CWE-284
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-03-13T21:27:52.824Z

Updated: 2026-03-16T16:42:54.043Z

Reserved: 2026-03-13T15:02:00.625Z

Link: CVE-2026-32720

cve-icon Vulnrichment

Updated: 2026-03-16T16:42:49.212Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-16T14:19:43.030

Modified: 2026-03-16T14:53:07.390

Link: CVE-2026-32720

cve-icon Redhat

No data.