The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-32745

CVE-2026-32745: JetBrains Datalore Auth Bypass Flaw

CVE-2026-32745 is an authentication bypass vulnerability in JetBrains Datalore that enables session hijacking due to missing secure cookie attributes. This article covers the technical details, affected versions, and mitigation.

Published: March 20, 2026

CVE-2026-32745 Overview

CVE-2026-32745 is a session hijacking vulnerability affecting JetBrains Datalore before version 2026.1. The vulnerability exists due to a missing Secure attribute in cookie settings, which could allow attackers on adjacent networks to intercept session cookies transmitted over unencrypted HTTP connections.

Critical Impact

An attacker positioned on the same network segment could intercept session cookies when a user accesses Datalore over an insecure connection, potentially leading to unauthorized account access and data exposure.

Affected Products

  • JetBrains Datalore versions prior to 2026.1

Discovery Timeline

  • 2026-03-13 - CVE-2026-32745 published to NVD
  • 2026-03-16 - Last updated in NVD database

Technical Details for CVE-2026-32745

Vulnerability Analysis

This vulnerability is classified under CWE-614 (Sensitive Cookie in HTTPS Session Without 'Secure' Attribute). The issue stems from improper cookie configuration in JetBrains Datalore's session management system. When the Secure attribute is not set on session cookies, the browser may transmit these cookies over unencrypted HTTP connections, making them susceptible to interception by network-based attackers.

The adjacent network attack vector indicates that exploitation requires the attacker to be on the same local network segment as the victim. This could include scenarios such as shared WiFi networks, compromised network segments, or man-in-the-middle positions within a local area network. The vulnerability allows for high confidentiality impact as session tokens could be stolen, enabling unauthorized access to user accounts and sensitive data within the Datalore collaborative data science platform.

Root Cause

The root cause is the absence of the Secure flag on session cookies set by the Datalore application. Without this attribute, cookies are transmitted over both HTTP and HTTPS connections. In environments where users might access the application over HTTP (even inadvertently through redirects or mixed content), session cookies become exposed to network-level interception.

Attack Vector

The attack requires the adversary to be positioned on an adjacent network with the ability to monitor network traffic. When a legitimate user authenticates to Datalore and receives session cookies without the Secure attribute, any subsequent HTTP request from that browser will include the session cookie in cleartext. An attacker using network sniffing tools can capture these cookies and replay them to hijack the user's session.

The exploitation scenario typically involves:

  1. The attacker positions themselves on the same network segment as the target user
  2. The user authenticates to JetBrains Datalore, receiving session cookies without the Secure attribute
  3. The user's browser makes any HTTP request (potentially triggered by mixed content or navigation)
  4. The attacker intercepts the HTTP traffic containing the session cookie
  5. The attacker uses the captured session cookie to impersonate the authenticated user

For technical details on this vulnerability, refer to the JetBrains Security Issues Fixed advisory.

Detection Methods for CVE-2026-32745

Indicators of Compromise

  • Unexpected session activity from IP addresses not associated with the legitimate user
  • Multiple concurrent sessions for a single user account from different geographic locations
  • Unusual data access patterns or API calls that deviate from the user's normal behavior
  • Network traffic logs showing session cookies transmitted over HTTP connections

Detection Strategies

  • Monitor network traffic for HTTP requests containing session cookies that should only be transmitted over HTTPS
  • Implement anomaly detection for user sessions originating from multiple IP addresses simultaneously
  • Review web server access logs for session reuse patterns indicative of hijacking
  • Deploy network intrusion detection systems (NIDS) to identify potential cookie interception attempts on local networks

Monitoring Recommendations

  • Enable detailed logging for authentication events and session management activities in Datalore
  • Configure alerts for session validation failures or suspicious session reuse attempts
  • Monitor for mixed content warnings in application logs that could indicate HTTP cookie exposure
  • Implement real-time session monitoring to detect concurrent session anomalies

How to Mitigate CVE-2026-32745

Immediate Actions Required

  • Upgrade JetBrains Datalore to version 2026.1 or later immediately
  • Force logout all active sessions after applying the patch to invalidate potentially compromised session tokens
  • Review access logs for signs of unauthorized session activity prior to patching
  • Ensure HTTPS is enforced for all Datalore deployments with proper HSTS configuration

Patch Information

JetBrains has addressed this vulnerability in Datalore version 2026.1. Organizations should upgrade to this version or later to ensure session cookies are properly configured with the Secure attribute. For detailed patch information, refer to the JetBrains Security Issues Fixed page.

Workarounds

  • Enforce HTTPS-only access to Datalore using web server or load balancer configuration to prevent HTTP connections
  • Configure HTTP Strict Transport Security (HSTS) headers to ensure browsers never attempt HTTP connections
  • Segment network access to Datalore to minimize exposure to adjacent network attacks
  • Implement network-level encryption (VPN or similar) for users accessing Datalore from potentially untrusted networks
bash
# Example nginx configuration to enforce HTTPS and HSTS
server {
    listen 80;
    server_name datalore.example.com;
    return 301 https://$server_name$request_uri;
}

server {
    listen 443 ssl;
    server_name datalore.example.com;
    
    # Enable HSTS
    add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always;
    
    # Additional security headers
    add_header X-Content-Type-Options nosniff;
    add_header X-Frame-Options DENY;
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechJetbrains

  • SeverityMEDIUM

  • CVSS Score6.3

  • EPSS Probability0.00%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityLow
  • AvailabilityNone
  • CWE References
  • CWE-614
  • Technical References
  • JetBrains Security Issues Fixed
  • Latest CVEs
  • CVE-2025-70797: LimeSurvey XSS Vulnerability

  • CVE-2025-30650: Juniper Junos OS Auth Bypass Vulnerability

  • CVE-2026-35471: Goshs Path Traversal Vulnerability

  • CVE-2026-35393: Goshs Path Traversal Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English