CVE-2026-24061 Exposed GNU Inetutils telnetd Servers to Unauthenticated RCE via Argument Injection

Related

Female Cybersecurity Leaders to Watch in Nevada

Nevada’s cybersecurity leadership bench reflects the state’s distinctive mix...

Female Cybersecurity Leaders to Watch in Louisiana

Louisiana’s cybersecurity leadership bench reflects a mix of banking,...

Female Cybersecurity Leaders to Watch in South Carolina

South Carolina’s cybersecurity leadership bench reflects a mix of...

Female Cybersecurity Leaders to Watch in Oregon

Oregon’s cybersecurity leadership bench reflects a mix of enterprise...

Female Cybersecurity Leaders to Watch in Missouri

Missouri’s cybersecurity leadership bench reflects a mix of higher...

Share

What happened

The GNU Inetutils telnetd vulnerability exposed large numbers of internet-accessible Telnet servers to unauthenticated remote code execution. The issue, tracked as CVE-2026-24061 (CVSS 9.8), was described as an authentication bypass rooted in argument injection affecting telnetd versions 1.9.3 through 2.7. The flaw occurs because telnetd fails to sanitize the USER environment variable before passing it to /usr/bin/login. An attacker can inject a value such as -f root, causing login to treat the session as a pre-authenticated root login and bypass credential checks. With authentication bypassed, attackers can gain root-level access and execute commands on exposed systems. The report also noted a proof-of-concept had been released and that roughly 800,000 Telnet instances were internet-facing.

Who is affected

Organizations running vulnerable GNU Inetutils telnetd versions with Telnet exposed to the internet are directly affected. Exposure is direct where the service is reachable externally, and potential where Telnet is present internally but accessible from less-trusted network segments.

Why CISOs should care

Unauthenticated RCE on legacy remote access services like Telnet can enable rapid compromise, persistence, and lateral movement—often on embedded, industrial, or infrastructure-adjacent systems that are harder to patch. Large-scale exposure increases the likelihood of opportunistic exploitation and automated scanning.

3 practical actions

  • Eliminate or isolate Telnet services: Disable Telnet where possible, and strictly restrict network access to telnetd services behind VPN and allowlisted management hosts.

  • Patch vulnerable telnetd versions: Upgrade GNU Inetutils telnetd beyond affected releases and verify authentication behavior is restored with regression testing.

  • Hunt for exploitation attempts: Monitor for suspicious telnetd sessions, unexpected root logins, and anomalous login invocation patterns on systems running telnetd.