Critical Authentication Bypass in GNU InetUtils telnetd
Summary
Hide ▲
Show ▼
A critical authentication bypass vulnerability (CVE-2026-24061) in GNU InetUtils telnetd, affecting versions 1.9.3 to 2.7, allows remote attackers to gain root access by exploiting the USER environment variable. The flaw, introduced in 2015, enables bypassing normal authentication if the client supplies a crafted USER value. Mitigations include patching and restricting network access to the telnet port. Shadowserver tracks nearly 800,000 IP addresses with Telnet fingerprints globally, with over 380,000 in Asia, almost 170,000 in South America, and just over 100,000 in Europe. GreyNoise observed 18 unique IP addresses exploiting this flaw over the past 24 hours, with attacks targeting the 'root' user in 83.3% of cases. The attacks involved automated reconnaissance and attempts to persist SSH keys and deploy Python malware, which failed on the observed systems due to missing binaries or directories.
Timeline
-
22.01.2026 18:30 3 articles · 4d ago
Critical Authentication Bypass in GNU InetUtils telnetd Disclosed
A critical authentication bypass vulnerability (CVE-2026-24061) in GNU InetUtils telnetd, affecting versions 1.9.3 to 2.7, allows remote attackers to gain root access by exploiting the USER environment variable. The flaw, introduced in 2015, enables bypassing normal authentication if the client supplies a crafted USER value. Mitigations include patching and restricting network access to the telnet port. Shadowserver tracks nearly 800,000 IP addresses with Telnet fingerprints globally, with over 380,000 in Asia, almost 170,000 in South America, and just over 100,000 in Europe. GreyNoise observed 18 unique IP addresses exploiting this flaw over the past 24 hours, with attacks targeting the 'root' user in 83.3% of cases. The attacks involved automated reconnaissance and attempts to persist SSH keys and deploy Python malware, which failed on the observed systems due to missing binaries or directories.
Show sources
- Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access — thehackernews.com — 22.01.2026 18:30
- Hackers exploit critical telnetd auth bypass flaw to get root — www.bleepingcomputer.com — 23.01.2026 18:21
- Nearly 800,000 Telnet servers exposed to remote attacks — www.bleepingcomputer.com — 26.01.2026 17:19
Information Snippets
-
The vulnerability, CVE-2026-24061, has a CVSS score of 9.8.
First reported: 22.01.2026 18:302 sources, 3 articlesShow sources
- Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access — thehackernews.com — 22.01.2026 18:30
- Hackers exploit critical telnetd auth bypass flaw to get root — www.bleepingcomputer.com — 23.01.2026 18:21
- Nearly 800,000 Telnet servers exposed to remote attacks — www.bleepingcomputer.com — 26.01.2026 17:19
-
The flaw allows remote attackers to bypass authentication and gain root access by sending a crafted USER environment variable with the value '-f root'.
First reported: 22.01.2026 18:302 sources, 3 articlesShow sources
- Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access — thehackernews.com — 22.01.2026 18:30
- Hackers exploit critical telnetd auth bypass flaw to get root — www.bleepingcomputer.com — 23.01.2026 18:21
- Nearly 800,000 Telnet servers exposed to remote attacks — www.bleepingcomputer.com — 26.01.2026 17:19
-
The vulnerability was introduced in a source code commit on March 19, 2015, and released in version 1.9.3 on May 12, 2015.
First reported: 22.01.2026 18:302 sources, 3 articlesShow sources
- Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access — thehackernews.com — 22.01.2026 18:30
- Hackers exploit critical telnetd auth bypass flaw to get root — www.bleepingcomputer.com — 23.01.2026 18:21
- Nearly 800,000 Telnet servers exposed to remote attacks — www.bleepingcomputer.com — 26.01.2026 17:19
-
Security researcher Kyu Neushwaistein (aka Carlos Cortes Alvarez) discovered and reported the flaw on January 19, 2026.
First reported: 22.01.2026 18:302 sources, 2 articlesShow sources
- Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access — thehackernews.com — 22.01.2026 18:30
- Hackers exploit critical telnetd auth bypass flaw to get root — www.bleepingcomputer.com — 23.01.2026 18:21
-
Mitigations include applying the latest patches, restricting network access to the telnet port, disabling telnetd, or using a custom login tool that does not permit the '-f' parameter.
First reported: 22.01.2026 18:302 sources, 2 articlesShow sources
- Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access — thehackernews.com — 22.01.2026 18:30
- Nearly 800,000 Telnet servers exposed to remote attacks — www.bleepingcomputer.com — 26.01.2026 17:19
-
GreyNoise observed 21 unique IP addresses attempting to exploit the flaw over the past 24 hours, originating from Hong Kong, the U.S., Japan, the Netherlands, China, Germany, Singapore, and Thailand.
First reported: 22.01.2026 18:302 sources, 3 articlesShow sources
- Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access — thehackernews.com — 22.01.2026 18:30
- Hackers exploit critical telnetd auth bypass flaw to get root — www.bleepingcomputer.com — 23.01.2026 18:21
- Nearly 800,000 Telnet servers exposed to remote attacks — www.bleepingcomputer.com — 26.01.2026 17:19
-
The flaw occurs because telnetd passes the user-controlled USER environment variable directly to login(1) without sanitization.
First reported: 23.01.2026 18:211 source, 2 articlesShow sources
- Hackers exploit critical telnetd auth bypass flaw to get root — www.bleepingcomputer.com — 23.01.2026 18:21
- Nearly 800,000 Telnet servers exposed to remote attacks — www.bleepingcomputer.com — 26.01.2026 17:19
-
The issue affects GNU InetUtils versions 1.9.3 (released in 2015) through 2.7, and was patched in version 2.8.
First reported: 23.01.2026 18:211 source, 2 articlesShow sources
- Hackers exploit critical telnetd auth bypass flaw to get root — www.bleepingcomputer.com — 23.01.2026 18:21
- Nearly 800,000 Telnet servers exposed to remote attacks — www.bleepingcomputer.com — 26.01.2026 17:19
-
GNU InetUtils is a collection of classic network client and server tools (telnet/telnetd, ftp/ftpd, rsh/rshd, ping, traceroute) maintained by the GNU Project, and used across multiple Linux distributions.
First reported: 23.01.2026 18:211 source, 2 articlesShow sources
- Hackers exploit critical telnetd auth bypass flaw to get root — www.bleepingcomputer.com — 23.01.2026 18:21
- Nearly 800,000 Telnet servers exposed to remote attacks — www.bleepingcomputer.com — 26.01.2026 17:19
-
GreyNoise detected real-world exploitation activity leveraging CVE-2026-24061 against a small number of vulnerable endpoints, with 18 unique attacker IPs across 60 Telnet sessions, all deemed 100% malicious, sending 1,525 packets totaling 101.6 KB.
First reported: 23.01.2026 18:211 source, 2 articlesShow sources
- Hackers exploit critical telnetd auth bypass flaw to get root — www.bleepingcomputer.com — 23.01.2026 18:21
- Nearly 800,000 Telnet servers exposed to remote attacks — www.bleepingcomputer.com — 26.01.2026 17:19
-
The attacks varied in terminal speed, type, and X11 DISPLAY values, but in 83.3% of the cases, they targeted the 'root' user.
First reported: 23.01.2026 18:211 source, 2 articlesShow sources
- Hackers exploit critical telnetd auth bypass flaw to get root — www.bleepingcomputer.com — 23.01.2026 18:21
- Nearly 800,000 Telnet servers exposed to remote attacks — www.bleepingcomputer.com — 26.01.2026 17:19
-
In the post-exploitation phase, the attackers conducted automated reconnaissance and attempted to persist SSH keys and deploy Python malware, which failed on the observed systems due to missing binaries or directories.
First reported: 23.01.2026 18:211 source, 2 articlesShow sources
- Hackers exploit critical telnetd auth bypass flaw to get root — www.bleepingcomputer.com — 23.01.2026 18:21
- Nearly 800,000 Telnet servers exposed to remote attacks — www.bleepingcomputer.com — 26.01.2026 17:19
-
Shadowserver tracks nearly 800,000 IP addresses with Telnet fingerprints globally, with over 380,000 in Asia, almost 170,000 in South America, and just over 100,000 in Europe.
First reported: 26.01.2026 17:191 source, 1 articleShow sources
- Nearly 800,000 Telnet servers exposed to remote attacks — www.bleepingcomputer.com — 26.01.2026 17:19
-
The malicious activity started on January 21, originating from 18 IP addresses across 60 Telnet sessions, abusing the Telnet IAC option negotiation to inject 'USER=-f <user>' and grant attackers' shell access to compromised devices without authentication.
First reported: 26.01.2026 17:191 source, 1 articleShow sources
- Nearly 800,000 Telnet servers exposed to remote attacks — www.bleepingcomputer.com — 26.01.2026 17:19
-
Admins who can't immediately upgrade their devices to the patched release are advised to disable the vulnerable telnetd service or block TCP port 23 on all firewalls.
First reported: 26.01.2026 17:191 source, 1 articleShow sources
- Nearly 800,000 Telnet servers exposed to remote attacks — www.bleepingcomputer.com — 26.01.2026 17:19
Similar Happenings
CVE-2024-37079 in VMware vCenter Exploited in the Wild
CVE-2024-37079, a critical heap overflow flaw in VMware vCenter Server, is being actively exploited in the wild. The vulnerability, patched in June 2024, allows remote code execution via a specially crafted network packet. Broadcom confirmed the active exploitation and advised customers to apply security patches immediately. CISA added the flaw to its KEV catalog, mandating FCEB agencies to secure their systems by February 13, 2026, under BOD 22-01. There are no known workarounds or mitigations, emphasizing the urgency of applying the latest patches.
CISA Adds Actively Exploited Digiever NVR Vulnerability to KEV Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability in Digiever DS-2105 Pro network video recorders (NVRs) to its Known Exploited Vulnerabilities (KEV) catalog due to active exploitation. The flaw, tracked as CVE-2023-52163, allows post-authentication remote code execution via command injection. The vulnerability remains unpatched as the device has reached end-of-life (EoL) status. Threat actors are exploiting this flaw to deliver botnets like Mirai and ShadowV2. CISA recommends mitigations or discontinuation of the product by January 12, 2025.
RondoDox botnet exploits 56 n-day vulnerabilities in global attacks
The RondoDox botnet has been actively exploiting over 50 vulnerabilities across more than 30 vendors since May 2025. The botnet uses an 'exploit shotgun' strategy to maximize infections, targeting both older and more recent vulnerabilities. The list of exploited vulnerabilities includes CVE-2023-1389, a flaw in the TP-Link Archer AX21 Wi-Fi router, and others demonstrated at Pwn2Own events. In January 2026, the botnet was identified targeting the critical HPE OneView vulnerability CVE-2025-37164, with over 40,000 attack attempts recorded on 7 January. The vulnerability, which has a CVSS 3.1 score of 10 (critical), was added to CISA's Known Exploited Vulnerabilities (KEV) catalog. The botnet's activity poses significant risks, especially for devices that have reached end-of-life and are more likely to remain unpatched. Many users also tend to ignore firmware updates for supported hardware, increasing the risk of exploitation. The botnet targets 35 to 40 vulnerabilities found in consumer-oriented devices, which are often unmanaged and rarely updated. The botnet's impact scale is potentially quite large, though not yet fully known. To mitigate the threat, users are advised to apply the latest firmware updates, replace end-of-life equipment, segment their networks, and use strong, unique passwords.
Red Hat OpenShift AI Privilege Escalation Vulnerability
A severe security flaw in Red Hat OpenShift AI (CVE-2025-10725) allows authenticated attackers to escalate privileges and fully compromise hybrid cloud infrastructure. The vulnerability affects versions 2.19, 2.21, and RHOAI. Attackers with low-privileged access can gain full cluster administrator privileges, leading to data theft, service disruption, and infrastructure takeover. Red Hat classifies the flaw as 'Important' due to the need for authentication, but it carries a CVSS score of 9.9. Mitigations include avoiding broad permissions and adhering to the principle of least privilege.
Critical Out-of-Bounds Write Vulnerabilities in WatchGuard Firebox Firewalls Exploited in the Wild
Over 115,000 WatchGuard Firebox network security appliances remain exposed to critical remote code execution flaws, including CVE-2025-9242 and the newly disclosed CVE-2025-14733. These vulnerabilities allow remote attackers to execute code without authentication. WatchGuard has released patches and provided temporary workarounds for administrators who cannot immediately update their devices. The vulnerabilities are actively being exploited in the wild, and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-9242 to its Known Exploited Vulnerabilities (KEV) catalog on November 13, 2025, based on evidence of active exploitation. Federal Civilian Executive Branch (FCEB) agencies are advised to apply WatchGuard's patches by December 3, 2025. The Shadowserver Foundation detected over 71,000 vulnerable devices as of October 17, 2025. As of November 12, 2025, over 54,300 Firebox instances remain vulnerable, with the U.S. having the highest number of vulnerable devices at 18,500. On December 22, 2025, Shadowserver found over 124,658 unpatched Firebox instances exposed online, with 117,490 still exposed the following day. CISA added CVE-2025-14733 to its KEV Catalog and ordered FCEB agencies to patch Firebox firewalls within a week, by December 26th.