Remote Authentication Bypass in GNU Inetutils Telnetd
CVE-2026-24061
Key Information:
Badges
What is CVE-2026-24061?
CVE-2026-24061 is a vulnerability found in the GNU Inetutils package, specifically in the telnet daemon (telnetd). GNU Inetutils is a collection of common networking utilities, and telnetd is used to enable remote command-line access to a server. This particular vulnerability arises from a flaw in the handling of the USER environment variable; specifically, an attacker can bypass authentication procedures by setting the USER variable to “-f root.”
The exploitation of this vulnerability can allow unauthorized users to gain access to systems with elevated privileges, posing a significant security risk. If an organization relies on GNU Inetutils for managing remote access, a successful exploitation could lead to unauthorized access to sensitive data, control over critical systems, and the potential for further attacks within the network.
Potential impact of CVE-2026-24061
-
Unauthorized System Access: Attackers can gain remote access to systems without proper authentication, allowing them control over crucial system functions and data.
-
Privilege Escalation: By manipulating the USER environment variable, unauthorized users can operate with root-level privileges, significantly increasing the risks of malicious activities.
-
Data Breach Risk: The ability to bypass authentication may facilitate data exfiltration or compromise of sensitive information, potentially leading to regulatory penalties and loss of customer trust.
CISA has reported CVE-2026-24061
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2026-24061 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace
The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Inetutils 1.9.3 <= 2.7
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
29% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🦅
CISA Reported
- 🥇
Vulnerability reached the number 1 worldwide trending spot
- 📈
Vulnerability started trending
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved