CVE-2026-24061 – 11 Year old Vulnerability gets traction

CVE-2026-24061 – 11 Year old Vulnerability gets traction


CVE-2026-24061 is a critical authentication bypass vulnerability in the telnetd service of GNU Inetutils versions 1.9.3 through 2.7.It allows remote attackers to gain root access by setting the USER environment variable to “-f root”, bypassing normal login credentials.

Vulnerability Details

This flaw, present since around 2015 (nearly 11 years), stems from improper sanitization of the USER environment variable before passing it to /usr/bin/login, enabling argument injection. CVSS v3.1 base score is 9.8 (Critical), with network attack vector, low complexity, no privileges or user interaction required, and high impacts on confidentiality, integrity, and availability.

Affected Systems

Primarily impacts Linux, BSD, OT, and embedded systems running vulnerable GNU Inetutils telnetd, with an estimated 212,396 exposed Telnet servers internet-wide. Distributions like Debian bookworm (pre-2:2.4-2+deb12u2) and Ubuntu are affected until patched.

Exploitation and Risks

Active exploitation has been observed, including malware deployment and persistence establishment; PoC exploits are publicly available. It poses a direct initial access risk for internet-facing Telnet services.

Mitigation

Update to GNU Inetutils 2.7-2 or later; disable Telnet if unused, as it’s inherently insecure.Vendors like Red Hat, Ubuntu, and Debian have issued patches or advisories

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.