Exclusive Webinar: Beyond the Perimeter – How to See Every Threat in Hybrid Networks

CVE-2026-24061

GNU InetUtils Telnetd Vulnerable to Remote Root Login Bypass: CVE-2026-24061 Breakdown

CVSS Gauge
CVSS Needle

Summary

CVE-2026-24061 is a critical flaw in GNU InetUtils telnetd (1.9.3 – 2.7) that lets remote attackers bypass login and gain root access. It occurs because the USER variable is not validated, allowing USER=-f root to skip authentication. Update to 2.7 – 2 or later, disable Telnet, or switch to SSH.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2026-24061?

Technical Overview

How Does the CVE-2026-24061 Exploit Work?

The attack typically follows these steps:

CVE-2026-24061

What Causes CVE-2026-24061?

Vulnerability Root Cause:

The flaw exists because telnetd does not properly validate the USER variable. It passes this input directly to /usr/bin/login, allowing the -f option to bypass authentication.

How Can You Mitigate CVE-2026-24061?

If immediate patching is delayed or not possible:

  • Disable telnetd on affected systems.
  • Block or limit access to port 23.
  • Use SSH instead of Telnet.
  • Check for exposed Telnet services, especially on older or embedded devices.

Which Assets and Systems Are at Risk?

Will Patching CVE-2026-24061 Cause Downtime?

Patch application impact: Low. Updating to GNU InetUtils 2.7 – 2 or later (or vendor-fixed packages) requires installing updates and restarting telnetd, which may cause brief downtime.

Mitigation (if immediate patching is not possible): Disable telnetd or block TCP port 23. Systems remain exposed to remote root access until fully patched or the service is turned off.

How Can You Detect CVE-2026-24061 Exploitation?

Exploitation Signatures:

Monitor Telnet sessions where the USER environment variable is set to suspicious values such as -f root during NEW-ENVIRON negotiation. Unexpected root logins without password prompts may indicate exploitation.

Indicators of Compromise (IOCs/IOAs):

Behavioral Indicators:

Alerting Strategy:

Remediation & Response

CVSS Breakdown Table

MetricValue Description
Base Score9.8Critical severity reflecting remote authentication bypass and root access
Attack Vector NetworkExploitable remotely over Telnet (TCP port 23)
Attack ComplexityLowNo special conditions required for exploitation
Privileges RequiredNoneAttack can be performed without prior authentication
User InteractionNoneNo user action is needed for the attack to succeed
ScopeUnChangedThe impact is confined to the affected system
Confidentiality Impact HighSuccessful exploitation grants root-level access
Integrity ImpactHighRoot access allows modification of system data
Availability ImpactHighRoot-level control can disrupt system operations

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.