Description
A critical flaw exists in the telnetd service within GNU Inetutils, allowing for remote authentication bypass. This issue, present for approximately 11 years, enables attackers to gain root access by manipulating the
USER
environment variable. Specifically, setting the
USER
variable to '-f root' circumvents normal authentication processes. The vulnerability resides in how the
telnetd
server passes the
USER
environment variable to the
/usr/bin/login
function without proper sanitization. Active exploitation of this vulnerability has been observed, with reports indicating attempts from multiple countries. Approximately 41,000 instances are exposed. The vulnerability affects the
/usr/bin/login
function, which is normally executed as root.
Recommendations
Disable the
telnetd
service immediately and migrate to secure alternatives like SSH.
If
telnetd
usage is unavoidable, restrict network access to trusted internal sources only.