SOC Prime Bias: Critical

29 Jan 2026 18:51

CVE-2026-24061: GNU InetUtils Telnetd Remote Authentication Bypass

Author Photo
Ruslan Mikhalov Chef de la Recherche sur les Menaces chez SOC Prime linkedin icon Suivre
CVE-2026-24061: GNU InetUtils Telnetd Remote Authentication Bypass
shield icon

Detection stack

  • AIDR
  • Alert
  • ETL
  • Query

Summary

CVE-2026-24061 is a remote authentication bypass in GNU InetUtils telnetd affecting versions 1.9.3 through 2.7. An unauthenticated attacker can supply a specially crafted USER environment variable and pass it through a telnet client using the -a or –login options, enabling a login that results in root-level access. The issue is rated CVSS 9.8. The scope is limited to GNU InetUtils telnetd (up to 2.7); other telnetd implementations (including Cisco IOS, Microsoft, Netkit, and BusyBox) are not impacted. Successful exploitation enables remote access and can also be used to achieve local privilege escalation to root. The safest mitigation is to identify and disable Telnet entirely network restrictions may reduce exposure, but only removing the service eliminates the local root escalation risk.

Investigation

NSFOCUS CERT determined that telnetd does not correctly validate the USER environment variable supplied by the client. By abusing this validation weakness, an attacker can bypass standard authentication logic and obtain root access on vulnerable Linux/Unix hosts running the affected daemon.

Mitigation

A vendor fix is available for GNU InetUtils; impacted systems should upgrade to a patched release. If patching cannot be completed immediately, disable telnetd and migrate to SSH. Additional interim hardening includes configuring telnetd to use a custom login wrapper and disabling or preventing use of the -f parameter where applicable.

Response

Identify systems running telnetd, and monitor for telnet sessions invoked with -a or –login, especially when remote attempts to set the USER environment variable are observed. Prioritize patch deployment, disable telnetd wherever feasible, and enforce encrypted remote administration protocols to prevent re-exploitation.

Attack Flow

We are still updating this part. Sign up to get notified

Notify Me

Simulation

We are still updating this part. Sign up to get notified

Notify Me