VYPR
High severityNVD Advisory· Published Mar 16, 2026· Updated Apr 16, 2026

CVE-2026-32720

CVE-2026-32720

Description

The CTFer.io Monitoring component is in charge of the collection, process and storage of various signals (i.e. logs, metrics and distributed traces). Prior to 0.2.1, due to a mis-written NetworkPolicy, a malicious actor can pivot from a component to any other namespace. This breaks the security-by-default property expected as part of the deployment program, leading to a potential lateral movement. This vulnerability is fixed in 0.2.1.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/ctfer-io/monitoringGo
< 0.2.10.2.1

Patches

1
5404a11863b3

fix: remove invalid network policy (#168)

https://github.com/ctfer-io/monitoringLucas TessonMar 13, 2026via ghsa
1 file changed · +0 38
  • services/parts/namespace.go+0 38 modified
    @@ -25,7 +25,6 @@ type (
     		ns          *corev1.Namespace
     		npol        *netwv1.NetworkPolicy
     		dnspol      *netwv1.NetworkPolicy
    -		internspol  *netwv1.NetworkPolicy
     		internetpol *netwv1.NetworkPolicy
     
     		// Name of the namespace. Is going to be appended a 8-char random string
    @@ -193,43 +192,6 @@ func (ns *Namespace) provision(
     		return
     	}
     
    -	// Whatever happens (IP ranges, DNS entries) deny all traffic to adjacent
    -	// namespaces -> isolation by default/in depth.
    -	ns.internspol, err = netwv1.NewNetworkPolicy(ctx, "inter-ns", &netwv1.NetworkPolicyArgs{
    -		Metadata: metav1.ObjectMetaArgs{
    -			Namespace: ns.ns.Metadata.Name(),
    -			Labels:    args.AdditionalLabels,
    -		},
    -		Spec: netwv1.NetworkPolicySpecArgs{
    -			PodSelector: metav1.LabelSelectorArgs{},
    -			PolicyTypes: pulumi.ToStringArray([]string{
    -				"Egress",
    -			}),
    -			Egress: netwv1.NetworkPolicyEgressRuleArray{
    -				netwv1.NetworkPolicyEgressRuleArgs{
    -					To: netwv1.NetworkPolicyPeerArray{
    -						netwv1.NetworkPolicyPeerArgs{
    -							NamespaceSelector: metav1.LabelSelectorArgs{
    -								MatchExpressions: metav1.LabelSelectorRequirementArray{
    -									metav1.LabelSelectorRequirementArgs{
    -										Key:      pulumi.String("kubernetes.io/metadata.name"),
    -										Operator: pulumi.String("NotIn"),
    -										Values: pulumi.StringArray{
    -											ns.ns.Metadata.Name().Elem(),
    -										},
    -									},
    -								},
    -							},
    -						},
    -					},
    -				},
    -			},
    -		},
    -	}, opts...)
    -	if err != nil {
    -		return
    -	}
    -
     	// For dependencies resolution and the use of external services, grant
     	// access to internet, i.e. all IP ranges except private ones
     	// (https://en.wikipedia.org/wiki/Private_network#Private_IPv4_addresses).
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.