Remote Authentication Bypass in GNU Inetutils Telnetd
CVE-2026-24061

9.8CRITICAL

Key Information:

Vendor

Gnu

Status
Vendor
CVE Published:
21 January 2026

Badges

📈 Score: 172👾 Exploit Exists🟡 Public PoC

What is CVE-2026-24061?

CVE-2026-24061 is a vulnerability found in the GNU Inetutils package, specifically in the telnet daemon (telnetd). GNU Inetutils is a collection of common networking utilities, and telnetd is used to enable remote command-line access to a server. This particular vulnerability arises from a flaw in the handling of the USER environment variable; specifically, an attacker can bypass authentication procedures by setting the USER variable to “-f root.”

The exploitation of this vulnerability can allow unauthorized users to gain access to systems with elevated privileges, posing a significant security risk. If an organization relies on GNU Inetutils for managing remote access, a successful exploitation could lead to unauthorized access to sensitive data, control over critical systems, and the potential for further attacks within the network.

Potential impact of CVE-2026-24061

  1. Unauthorized System Access: Attackers can gain remote access to systems without proper authentication, allowing them control over crucial system functions and data.

  2. Privilege Escalation: By manipulating the USER environment variable, unauthorized users can operate with root-level privileges, significantly increasing the risks of malicious activities.

  3. Data Breach Risk: The ability to bypass authentication may facilitate data exfiltration or compromise of sensitive information, potentially leading to regulatory penalties and loss of customer trust.

Affected Version(s)

Inetutils 1.9.3 <= 2.7

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.