A vulnerability in Grafana Tempo exposes the S3 SSE-C encryption key in plaintext through the /status/config endpoint, potentially allowing unauthorized users to obtain the key used to encrypt trace data stored in S3.
Thanks to william_goodfellow for reporting this vulnerability.
References
| Link | Resource |
|---|---|
| https://grafana.com/security/security-advisories/cve-2026-28377 | Vendor Advisory |
Configurations
History
31 Mar 2026, 19:00
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://grafana.com/security/security-advisories/cve-2026-28377 - Vendor Advisory | |
| First Time |
Grafana
Grafana tempo |
|
| CPE | cpe:2.3:a:grafana:tempo:*:*:*:*:*:*:*:* |
27 Mar 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-326 | |
| Summary |
|
26 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-26 22:16
Updated : 2026-03-31 19:00
NVD link : CVE-2026-28377
Mitre link : CVE-2026-28377
CVE.ORG link : CVE-2026-28377
JSON object : View
Products Affected
grafana
- tempo
CWE
CWE-326
Inadequate Encryption Strength
