CVE-2026-24061

telnetd · telnetd in GNU Inetutils through Multiple Products

A critical remote authentication bypass vulnerability, identified as CVE-2026-24061, has been discovered in the telnetd service of GNU Inetutils.

Executive summary

A critical remote authentication bypass vulnerability, identified as CVE-2026-24061, has been discovered in the telnetd service of GNU Inetutils. This flaw allows an unauthenticated remote attacker to gain complete control (root access) of an affected system without a password, posing a severe risk of total system compromise. Immediate patching or disabling of the telnetd service is required to mitigate this threat.

Vulnerability

The vulnerability exists in how the telnetd service handles environment variables passed from a remote client. An attacker can exploit this by providing a specially crafted username string, specifically "-f root", as the USER environment variable during the login negotiation process. The telnetd daemon incorrectly passes this value to the underlying login utility, which interprets the "-f" flag as an instruction to forgo authentication, thereby granting the attacker a root-level shell without requiring a password.

Business impact

This vulnerability is rated as critical with a CVSS score of 9.8, reflecting the ease of exploitation and the maximum potential impact. Successful exploitation grants an attacker full administrative (root) access to the affected system. This can lead to a complete loss of confidentiality, integrity, and availability, resulting in severe business consequences such as data theft of sensitive corporate or customer information, deployment of ransomware, destruction of critical data, and the use of the compromised system to launch further attacks against the internal network.

Remediation

Immediate Action: The primary remediation is to apply the security patches provided by the vendor. Administrators must update the GNU Inetutils package on all affected systems to a version that corrects this flaw. Due to the severity, this should be treated as an emergency change and deployed immediately, prioritizing publicly accessible systems.

Proactive Monitoring: Security teams should actively monitor for signs of exploitation. This includes inspecting network traffic for connection attempts to the telnet port (TCP/23) and reviewing system authentication logs (e.g., /var/log/auth.log, /var/log/secure) for login attempts where the username is recorded as "-f root". Monitor for any unexpected processes being spawned by the telnetd or in.telnetd service.

Compensating Controls: If immediate patching is not feasible, the following compensating controls should be implemented:

  • Disable the Service: Disable and stop the telnetd service entirely. Telnet is an insecure, cleartext protocol and should be replaced with a secure alternative like SSH.
  • Firewall Rules: Implement strict firewall rules at the network and host level to block all incoming connections to TCP port 23 from untrusted networks.
  • Network Segmentation: Ensure critical systems are on segmented networks to limit the blast radius if a less critical, vulnerable system is compromised.

Exploitation status

Public Exploit Available: true

Analyst recommendation

Given the critical CVSS score of 9.8 and the public availability of exploit code, this vulnerability represents a clear and present danger to the organization. We strongly recommend immediate and decisive action. All instances of the vulnerable telnetd service must be patched or disabled without delay, with the highest priority given to internet-facing systems. Furthermore, this event should trigger a strategic review to accelerate the decommissioning of the insecure Telnet protocol across the entire environment in favor of SSH.