Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The Download: chatbots for health, and US fights over AI regulation

    Why 2026 is a hot year for lithium

    Yann LeCun’s new venture is a contrarian bet against large language models  

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026

      Ashley St. Clair, the mother of one of Elon Musk’s children, sues xAI over Grok sexual images

      January 17, 2026

      Anthropic joins OpenAI’s push into health care with new Claude tools

      January 12, 2026

      The mother of one of Elon Musk’s children says his AI bot won’t stop creating sexualized images of her

      January 7, 2026

      A new pope, political shake-ups and celebs in space: The 2025-in-review news quiz

      December 31, 2025
    • Business

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025
    • Crypto

      Bitcoin Flat at $89,000, but Charts Warn Buyers Are Losing Ground

      January 24, 2026

      Spacecoin Launches with a 65% Rally Post-Airdrop, But Will the Hype Hold?

      January 24, 2026

      Solana’s New $500 Smartphone Token Skyrocketed After Launch

      January 24, 2026

      Ex-Olympian Turns Himself In Over Accusations of Running a Crypto Drug Network

      January 24, 2026

      Jeff Bezos Denies Polymarket Claim, Rekindling Debate Over Fake News on Betting Platforms

      January 24, 2026
    • Technology

      The Download: chatbots for health, and US fights over AI regulation

      January 24, 2026

      Why 2026 is a hot year for lithium

      January 24, 2026

      Yann LeCun’s new venture is a contrarian bet against large language models  

      January 24, 2026

      ShinyHunters claim to be behind SSO-account data theft attacks

      January 24, 2026

      Malicious AI extensions on VSCode Marketplace steal developer data

      January 24, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Hackers exploit critical telnetd auth bypass flaw to get root
    Technology

    Hackers exploit critical telnetd auth bypass flaw to get root

    TechAiVerseBy TechAiVerseJanuary 24, 2026No Comments4 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Hackers exploit critical telnetd auth bypass flaw to get root
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Hackers exploit critical telnetd auth bypass flaw to get root

    A coordinated campaign has been observed targeting a recently disclosed critical-severity vulnerability that has been present in the GNU InetUtils telnetd server for 11 years.

    The security issue is tracked as CVE-2026-24061 and was reported on January 20. It is trivial to leverage and multiple exploit examples are publicly available.

    Bug persisted since 2015

    Open-source contributor Simon Josefsson explains that the telnetd component of GNU InetUtils contains a remote-authentication bypass vulnerability caused by unsanitized environment variable handling when spawning ‘/usr/bin/login.’

    The flaw occurs because telnetd passes the user-controlled USER environment variable directly to login(1) without sanitization. By setting USER to -f root and connecting with the telnet -a command, an attacker can skip authentication and obtain root access.

    The issue affects GNU InetUtils versions 1.9.3 (released in 2015) through 2.7, and was patched in version 2.8. For those who cannot upgrade to the safe release, mitigation strategies include disabling the telnetd service or blocking TCP port 23 on all firewalls.

    GNU InetUtils is a collection of classic network client and server tools (telnet/telnetd, ftp/ftpd, rsh/rshd, ping, traceroute) maintained by the GNU Project, and used across multiple Linux distributions.

    Although Telnet is an insecure, legacy component largely replaced by SSH, many Linux and Unix systems still include it for compatibility or specialized usage needs. It is particularly prevalent in the industrial sector because of its simplicity and low overhead.

    On legacy and embedded devices, it can run without updates for more than a decade, explaining its presence in IoT devices, cameras, industrial sensors, and Operational Technology (OT) networks.

    Cristian Cornea of Zerotak, a penetration testing and cybersecurity services company, told BleepingComputer that critical systems are difficult to replace in OT/ICS environments.

    The researcher said that this is sometimes impossible because upgrades are accompanied by reboot operations. “As a result, we still encounter systems running Telnet servers, and even if you tried to replace them with more secure protocols such as SSH, this is not feasible due to legacy systems that remain in operation.”

    More technical users still rely on telnet for some projects:

    telnet still used to connect to old devices

    Another user confirmed the use of telnet “to connect to older Cisco devices that are way past “End of Life.”  Same SSH issue.”

    However, devices exposed on the public internet that still have telnet active are scarce, prompting many researchers to describe the CVE-2026-24061 vulnerability as less critical.

    Threat monitoring firm GreyNoise reports that it has detected real-world exploitation activity leveraging CVE-2026-24061 against a small number of vulnerable endpoints.

    The activity, logged between January 21 and 22, originated from 18 unique attacker IPs across 60 Telnet sessions, all deemed 100% malicious, sending 1,525 packets totaling 101.6 KB.

    Observed activity
    Source: GreyNoise

    The attacks abuse the Telnet IAC option negotiation to inject ‘USER=-f ’ and grant shell access without authentication. GreyNoise says most of the activity appears automated, although it noted a few “human-at-keyboard” cases.

    The attacks varied in terminal speed, type, and X11 DISPLAY values, but in 83.3% of the cases, they targeted the ‘root’ user.

    In the post-exploitation phase, the attackers conducted automated reconnaissance and attempted to persist SSH keys and deploy Python malware. GreyNoise reports that these attempts failed on the observed systems due to missing binaries or directories.

    While the exploitation activity appears limited in scope and success, potentially impacted systems should be patched or hardened as per the recommendations before the attackers optimize their attack chains.


    Secrets Security Cheat Sheet: From Sprawl to Control

    Whether you’re cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.

    Get the cheat sheet and take the guesswork out of secrets management.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleLegal AI giant Harvey acquires Hexus as competition heats up in legal tech
    Next Article US to deport Venezuelans who emptied bank ATMs using malware
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    The Download: chatbots for health, and US fights over AI regulation

    January 24, 2026

    Why 2026 is a hot year for lithium

    January 24, 2026

    Yann LeCun’s new venture is a contrarian bet against large language models  

    January 24, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025636 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025240 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025140 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025111 Views
    Don't Miss
    Technology January 24, 2026

    The Download: chatbots for health, and US fights over AI regulation

    The Download: chatbots for health, and US fights over AI regulation This is today’s edition…

    Why 2026 is a hot year for lithium

    Yann LeCun’s new venture is a contrarian bet against large language models  

    Bitcoin Flat at $89,000, but Charts Warn Buyers Are Losing Ground

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    The Download: chatbots for health, and US fights over AI regulation

    January 24, 20260 Views

    Why 2026 is a hot year for lithium

    January 24, 20261 Views

    Yann LeCun’s new venture is a contrarian bet against large language models  

    January 24, 20261 Views
    Most Popular

    A Team of Female Founders Is Launching Cloud Security Tech That Could Overhaul AI Protection

    March 12, 20250 Views

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.