Fixing and finding
Jump to remediation plan
CVE ID

CVE-2026-24061

Published 2026-01-21
Updated 3 months ago
Vendor/s
GNU
Product/s
InetUtils
Version/s
1.9.3 > 2.7
KEV Status
Active Exploitation
Listed in CISA's Known Exploited Vulnerabilities catalogue. Active exploitation observed in the wild.
CVSS Score (v3.1)
9.8
/ 10
Critical
Severity Details
Base score
9.8 Critical
Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Description

CVE-2026-24061 is a critical 9.8 CVSS authentication bypass in GNU Inetutils telnetd. Secure your systems against remote root access exploits.

CPE

GNU logo
GNU
Product Version Start Version End (excl.) Status
inetutils 1.9.3 2.7 vulnerable
debian_linux 11.0 11.0 vulnerable

Related weakness (CWE)

CWE-88

Remediation plan

1

Apply official patches

Install the latest security updates from the GNU project or your specific Linux distribution maintainers. Ensure that the patches specifically addressing the telnetd environment variable handling (commits ccba9f7 and fd702c0) are integrated into your build.

2

Update affected systems

Identify all deployments of GNU Inetutils between versions 1.9.3 and 2.7, as well as Debian 11 systems. Upgrade these instances to a patched version or a newer release where the authentication bypass vulnerability has been remediated.

3

Restrict access

Disable the telnet service (TCP port 23) entirely in favor of encrypted protocols like SSH. If telnet must remain active for legacy reasons, implement strict firewall rules or Access Control Lists (ACLs) to limit access to known, trusted management IP addresses.

4

Monitor for exploitation

Audit system and authentication logs for telnet sessions that bypass standard login prompts. Specifically, look for log entries or network captures containing the string '-f root' or other command-line flags within the USER environment variable negotiation.

Detection Guidance

Detecting this vulnerability requires monitoring Telnet protocol negotiation for the 'NEW-ENVIRON' option (RFC 1572). Look for network signatures where the USER variable is set to values starting with '-f'. Additionally, monitor system logs for successful root logins via telnetd that do not have corresponding successful password authentication events, which may indicate a successful bypass.

References

Sources

NIST National Vulnerability Database (NVD)
CISA Known Exploited Vulnerabilities (KEV)

Experience superior visibility and a simpler approach to cyber risk management