CVE-2026-32720

HIGH
2026-03-13 https://github.com/ctfer-io/monitoring GHSA-7x23-j8gv-v54x
Share

Lifecycle Timeline

4
PoC Detected
Mar 16, 2026 - 14:53 vuln.today
Public exploit code
Patch Released
Mar 16, 2026 - 14:53 nvd
Patch available
Analysis Generated
Mar 13, 2026 - 21:01 vuln.today
CVE Published
Mar 13, 2026 - 20:58 nvd
HIGH

Description

### Impact Due to a mis-written NetworkPolicy, a malicious actor can pivot from a component to any other namespace. This breaks the security-by-default property expected as part of the deployment program, leading to a potential lateral movement. ### Patch Removing the `inter-ns` NetworkPolicy patches the vulnerability. If updates are not possible in production environments, we recommend to manually delete it and update as soon as possible. ### Workaround Given your context, delete the failing network policy that should be prefixed by `inter-ns-` in the monitoring namespace. You can use the following to delete all matching network policy. If unsure of the outcome, please do it manually. ```bash for ns in $(kubectl get ns -o jsonpath='{.items[*].metadata.name}' | tr ' ' '\n' | grep '^monitoring-'); do kubectl -n "$ns" get networkpolicy -o name \ | grep '^networkpolicy.networking.k8s.io/inter-ns-' \ | xargs -r kubectl -n "$ns" delete done ```

Analysis

A misconfigured NetworkPolicy in Kubernetes deployments allows attackers to perform unauthorized lateral movement between namespaces, breaking namespace isolation security boundaries. This vulnerability affects Kubernetes environments with improperly configured inter-namespace NetworkPolicies, specifically those with 'inter-ns' prefixed policies in monitoring namespaces. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify and document all Kubernetes clusters using the affected inter-ns NetworkPolicy; assess current namespace isolation and data sensitivity. Within 7 days: Apply the vendor patch to all production and non-production environments, or execute the provided kubectl command to manually delete the inter-ns NetworkPolicy from all monitoring namespaces. …

Sign in for detailed remediation steps.

Priority Score

20
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +0
POC: +20

Share

CVE-2026-32720 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy