Stay Ahead of Threats That Are Shaping 2026: Exclusive Threat Report

CVE-2026-32746

CVE-2026-32746: Critical Telnetd Buffer Overflow Enables Pre-Auth Remote Code Execution

CVSS Gauge
CVSS Needle

Summary

CVE-2026-32746 is a critical flaw in GNU InetUtils telnetd (≤2.7) caused by missing bounds checks in the LINEMODE SLC handler. Attackers can send crafted SLC data during the handshake to trigger memory corruption and potential root-level RCE without authentication.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2026-32746?

Technical Overview

How Does the CVE-2026-32746 Exploit Work?

The attack typically follows these steps:

CVE-2026-32746

What Causes CVE-2026-32746?

Vulnerability Root Cause:

This vulnerability arises from missing bounds checks in the Telnet LINEMODE SLC handler in GNU InetUtils telnetd. The add_slc() function writes SLC triplet data into a fixed-size buffer without validating available space, causing an out-of-bounds write that corrupts adjacent memory, including internal pointers, during pre-authentication processing.

How Can You Mitigate CVE-2026-32746?

If immediate patching is delayed or not possible:

  • Disable Telnet if not required.
  • Restrict access to port 23.
  • Run telnetd with reduced privileges.
  • Limit access to trusted systems through strict network segmentation.
  • Monitor Telnet traffic for abnormal LINEMODE or excessive SLC negotiation patterns.

Which Assets and Systems Are at Risk?

Will Patching CVE-2026-32746 Cause Downtime?

Patch application impact: Low. Update telnetd when fixes are available; minimal disruption expected.

Mitigation (if immediate patching is not possible): Disable or restrict Telnet access (port 23). This reduces risk but does not fully eliminate exposure.

How Can You Detect CVE-2026-32746 Exploitation?

Exploitation Signatures:

Look for Telnet traffic with abnormal LINEMODE negotiation and SLC suboptions containing a high number of triplets (typically exceeding ~35).

Indicators of Compromise (IOCs/IOAs):

Behavioral Indicators:

Alerting Strategy:

Remediation & Response

CVSS Breakdown Table

MetricValue Description
Base Score9.8Critical severity indicating high impact and ease of exploitation
Attack Vector Network Exploitable remotely over the network (Telnet)
Exploitation is straightforward with crafted inputLowCan be triggered using crafted input without complex conditions
Privileges RequiredNoneNo authentication needed to exploit
User InteractionNoneNo user action required
ScopeUnchanged Impact remains within the vulnerable service
Confidentiality Impact HighMay expose sensitive system data
Integrity ImpactHighAllows modification of system state via memory corruption
Availability ImpactHighCan crash the service or disrupt operations

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.