Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Anduril has invented a novel drone flying contest where work is the prize

Bluesky previews 2026 roadmap: Discover feed, real-time features, and more improvements

Anthropic and OpenAI CEOs condemn ICE violence, praise Trump

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Critical flaw in GNU InetUtils telnetd allows attacker to bypass login and gain root access
Identity

Critical flaw in GNU InetUtils telnetd allows attacker to bypass login and gain root access

userBy userJanuary 22, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananJanuary 22, 2026Vulnerabilities / Linux

A serious security flaw has been revealed in the GNU InetUtils Telnet daemon (telnetd) that went unnoticed for nearly 11 years.

This vulnerability is tracked as CVE-2026-24061 and is rated 9.8 out of 10.0 on the CVSS scoring system. This affects all versions of GNU InetUtils from version 1.9.3 to version 2.7.

“Telnetd in GNU Inetutils 2.7 and later allows remote authentication bypass via the ‘-f root’ value of the USER environment variable,” according to the flaw description in the NIST National Vulnerability Database (NVD).

In a post to the oss-security mailing list, GNU contributor Simon Josefsson stated that this vulnerability could be exploited to gain root access to the target system.

The telnetd server calls /usr/bin/login (usually run as root) and passes the value of the USER environment variable received from the client as the last parameter.

If supplied by the client [sic] A carefully crafted USER environment value is the string “-f root”, and if you pass the telnet(1) -a or –login parameter to send this USER environment to the server, the client will automatically log in as root, bypassing the normal authentication process.

This occurs because the telnetd server is running. [sic] Rather than sanitizing the USER environment variable before passing it to login(1), login(1) uses the -f parameter to bypass normal authentication.

cyber security

Josefsson also noted that the vulnerability was introduced as part of a source code commit on March 19, 2015, which ultimately led to the version 1.9.3 release on May 12, 2015. Security researcher Ky Neushwaistein (aka Carlos Cortes Alvarez) is credited with discovering and reporting the flaw on January 19, 2026.

As a mitigation, we recommend applying the latest patches and restricting network access to Telnet ports to trusted clients. As a temporary workaround, users can disable the telnetd server or have InetUtils telnetd use a custom login(1) tool that does not allow the use of the “-f” parameter, Josefsson added.

According to data collected by threat intelligence firm GreyNoise, over the past 24 hours, 21 unique IP addresses have been observed attempting to leverage this flaw to perform remote authentication bypass attacks. All IP addresses originating from Hong Kong, the United States, Japan, the Netherlands, China, Germany, Singapore, and Thailand are flagged as malicious.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCreepy robot hand detaches from wrist and runs off to collect items
Next Article Ireland proposes new law allowing police to use spyware
user
  • Website

Related Posts

WhatsApp deploys lockdown-style security mode to protect targeted users from spyware

January 27, 2026

Experts detect Pakistan-linked cyber attack targeting Indian government agencies

January 27, 2026

ClickFix attack spreads using fake CAPTCHAs, Microsoft Scripts, and trusted web services

January 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Anduril has invented a novel drone flying contest where work is the prize

Bluesky previews 2026 roadmap: Discover feed, real-time features, and more improvements

Anthropic and OpenAI CEOs condemn ICE violence, praise Trump

Android smartphones are getting more anti-theft features

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.