Article Details
Scrape Timestamp (UTC): 2026-01-22 12:25:17.278
Source: https://www.theregister.com/2026/01/22/root_telnet_bug/
Original Article Text
Click to Toggle View
Ancient telnet bug happily hands out root to attackers. Critical vuln flew under the radar for a decade. A recently disclosed critical vulnerability in the GNU InetUtils telnet daemon (telnetd) is "trivial" to exploit, experts say. The bug, which had gone unnoticed for nearly 11 years, was disclosed on January 20 and is tracked as CVE-2026-24061 (9.8). It was introduced in a May 2015 update, and if you're one of the few to still be running telnetd, patch up, because attacks are already underway. GreyNoise data shows that in the past 24 hours, 15 unique IPs were trying to execute a remote authentication bypass attack by using the vulnerability. The security advisory explains that the bug allows attackers to easily gain root access to a target system. "The telnetd server invokes /usr/bin/login (normally running as root) passing the value of the USER environment variable received from the client as the last parameter," wrote GNU contributor Simon Josefsson. "If the client supply [sic] a carefully crafted USER environment value being the string '-f root', and passes the telnet(1) -a or --login parameter to send this USER environment to the server, the client will be automatically logged in as root bypassing normal authentication processes." Stephen Fewer, senior principal researcher at Rapid7, told The Register the vulnerability has "a number of worrying factors." The nature of the vulnerability, an argument injection flaw, means exploitation attempts are likely to be more reliable compared to more complex types, like memory corruption bugs, for example. The ease with which an attacker can successfully exploit it is also a concern. "Exploiting this vulnerability is straightforward: as documented in the disclosure, simply running a specific telnet command to connect to a remote server can trigger the issue and grant an attacker root access," said Fewer. "Rapid7 Labs has verified the vulnerability, confirming that exploitation is trivial and results in full root access on the target." Fewer went on to say that anyone running telnetd in 2026 probably shouldn't be. The program is unencrypted, meaning attackers can intercept login attempts and sessions by packet sniffing. Users should at the very least update to the latest version of telnetd and close it off from the web, but better still, upgrade to a more secure alternative, such as SSH. Josefsson also said in the advisory that his chief recommendation was for users to not run a telnetd server at all, and to restrict network access to the telnet port to trusted clients only. Although telnetd fell out of favor years ago, with alternatives such as SSH proving much more popular, contrary to popular belief, there are still a sizeable number of active deployments. France's CERT issued an advisory on Wednesday, saying "many telnet services are accessible on the internet, which is contrary to good practices. CERT-FR therefore recommends decommissioning all telnet services." National cybersecurity authorities in Canada and Belgium echoed the same recommendations, warning of the risks of a successful exploit and urging the retirement of telnetd.
Daily Brief Summary
A critical vulnerability in the GNU InetUtils telnet daemon (telnetd), tracked as CVE-2026-24061, allows attackers to gain root access, affecting systems using this outdated service.
The flaw, present for nearly 11 years, was disclosed on January 20 and is rated with a severity score of 9.8, indicating a critical risk level.
GreyNoise reported 15 unique IP addresses attempting to exploit this vulnerability within 24 hours of its disclosure, signaling active exploitation efforts.
The vulnerability involves an argument injection flaw, allowing attackers to bypass authentication with a crafted USER environment variable, granting root access.
Security experts recommend immediate patching and suggest migrating to more secure alternatives like SSH to mitigate potential risks.
National cybersecurity agencies in France, Canada, and Belgium have issued advisories urging the decommissioning of telnet services due to inherent security risks.
The incident serves as a reminder of the importance of regular system updates and the need to phase out legacy systems vulnerable to exploitation.