PT-2026-3756 · Gnu+2 · Inetutils+2

Carlos Cortes Alvarez

+1

·

Published

2026-01-20

·

Updated

2026-03-18

·

CVE-2026-24061

CVSS v2.0

10

Critical

AV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions GNU Inetutils versions 1.9.3 through 2.7
Description A critical vulnerability exists in the telnetd component of GNU Inetutils, allowing remote attackers to bypass authentication and gain root access. This is achieved by manipulating the USER environment variable, specifically by setting it to "-f root". The vulnerability stems from improper input validation, where the telnetd server passes this unsanitized value to the login program, which then allows access without requiring a password. This flaw has been present since 2015 and has recently been actively exploited. Approximately 800,000 systems are estimated to be vulnerable. The vulnerability allows an attacker to gain full control of a compromised system, potentially leading to malware installation, data exfiltration, and lateral movement within a network. The USER environment variable is used to pre-populate the username during authentication, and the "-f" flag bypasses interactive authentication.
Recommendations Upgrade to GNU Inetutils version 2.8 or later. If upgrading is not immediately possible, disable the telnetd service entirely to mitigate the risk. Restrict access to the telnetd service to trusted IP addresses if it must remain enabled. Monitor system logs for suspicious login attempts and unusual activity.

Exploit

Fix

RCE

Argument Injection

Weakness Enumeration

Related Identifiers

BDU:2026-00709
CVE-2026-24061
TELNETDCVE_2026_24061
USN-7992-1
USN-7992-2

Affected Products

Inetutils
Linuxmint
Ubuntu