CVE-2026-24061 is a critical authentication bypass vulnerability in GNU InetUtils telnetd that allows a remote, unauthenticated attacker to obtain root-level access by abusing how the Telnet daemon invokes the system login process. The vulnerability is trivially exploitable wherever telnetd is reachable over the network and carries a CVSS v3.1 score of 9.8 (Critical).
Because no authentication, user interaction, or special conditions are required, any exposed telnetd service should be treated as immediately at risk.
GreyNoise reports IP addresses have been observed attempting to exploit CVE-2026-24061, an authentication bypass vulnerability in GNU InetUtils telnetd through version 2.7. Observed activity includes attempts to abuse the flaw by supplying a crafted “-f root” value for the USER environment variable to bypass authentication and obtain root access.
This confirms the vulnerability is being actively targeted and should be treated as an immediate risk wherever telnetd is exposed.
GNU InetUtils telnetd is a Telnet server daemon responsible for accepting incoming Telnet connections, negotiating protocol options, and invoking the local login program to authenticate users. While Telnet is an aging protocol, telnetd remains present in many environments, including embedded Linux systems, network appliances, industrial and OT devices, and legacy vendor images where backward compatibility or operational convenience outweighs security hardening.
CVE-2026-24061 exists because telnetd fails to sanitize the USER environment variable before expanding it into the command line used to invoke login. A malicious Telnet client can supply a crafted value such as -f root, causing telnetd to execute: login -f root. The -f flag instructs login to bypass authentication entirely, resulting in an unauthenticated root shell.
This is a single-step, remote compromise that grants full administrative control of the host. An attacker can establish persistence, extract credentials, pivot into adjacent networks, or disrupt operations. The risk is amplified when telnetd is present on management networks, OT environments, or fleet-deployed devices that are difficult to rebuild or patch quickly..
The GNU InetUtils telnetd Rapid Response test (CVE-2026-24061), released January 23, 2026, enables customers to safely verify whether telnetd instances are exploitable to the authentication bypass flaw and therefore susceptible to unauthenticated root compromise, and to confirm remediation.
login -f invocation as a temporary mitigation.If the Rapid Response test confirms exploitability, collect forensic artifacts (Telnet session logs, process execution showing login -f usage, root shells spawned without authentication, and any post-compromise activity), isolate affected systems, and open an incident with your IR team.
Exploitation of CVE-2026-24061 may leave limited forensic artifacts. Defenders should review affected systems for:
login processes invoked with the -f flagBecause this attack abuses normal process execution paths, absence of alerts should not be treated as confirmation that systems are uncompromised.
Affected versions
GNU InetUtils versions 1.9.3 through 2.7
Patch guidance
Apply the upstream patches released on January 20, 2026, which sanitize environment variable expansion before invoking login, or upgrade to a fixed InetUtils release that includes these changes.
If immediate patching is not feasible, disable telnetd or enforce strict access controls and compensating mitigations until remediation is complete.
The NodeZero® platform empowers your organization to reduce your security risks by autonomously finding exploitable weaknesses in your network, giving you detailed guidance around how to priortize and fix them, and having you immediately verify that your fixes are effective.