PT-2026-3756 · Gnu · Inetutils

Carlos Cortes Alvarez

+1

·

Published

2026-01-21

·

Updated

2026-01-23

·

CVE-2026-24061

CVSS v3.1
9.8
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
GNU Inetutils and Affected Versions GNU Inetutils versions 1.9.3 through 2.7
Description A critical flaw exists in the telnetd service within GNU Inetutils, allowing for remote authentication bypass. This issue, present for approximately 11 years, enables attackers to gain root access by manipulating the
USER
environment variable. Specifically, setting the
USER
variable to '-f root' circumvents normal authentication processes. The vulnerability resides in how the
telnetd
server passes the
USER
environment variable to the
/usr/bin/login
function without proper sanitization. Active exploitation of this vulnerability has been observed, with reports indicating attempts from multiple countries. Approximately 41,000 instances are exposed. The vulnerability affects the
/usr/bin/login
function, which is normally executed as root.
Recommendations Disable the
telnetd
service immediately and migrate to secure alternatives like SSH. If
telnetd
usage is unavoidable, restrict network access to trusted internal sources only.

Exploit

Fix

RCE

Argument Injection

Weakness Enumeration

Related Identifiers

CVE-2026-24061

Affected Products

Inetutils