Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE via Port 23
好的,我现在需要帮用户总结一篇文章,控制在100字以内。用户给的文章内容是关于一个严重的安全漏洞,影响GNU InetUtils的telnetd服务。漏洞编号是CVE-2026-32746,CVSS评分9.8,属于高危。 首先,我需要抓住文章的主要信息点:漏洞影响范围、攻击方式、后果以及建议的缓解措施。漏洞允许未认证的远程攻击者执行任意代码,提升权限。攻击者通过发送特制消息,在连接握手阶段就能触发漏洞,无需登录。 接下来,处理建议包括停用服务、限制端口访问等。这些信息都需要在100字内简洁表达。 然后,我要确保语言准确且简洁,避免使用复杂的术语,让读者一目了然。同时,注意不要使用“文章内容总结”之类的开头词,直接描述即可。 最后,检查字数是否符合要求,并确保所有关键点都被涵盖。 </think> GNU InetUtils telnetd 存在严重漏洞(CVE-2026-32746),CVSS 评分 9.8。该漏洞可通过特制消息在连接握手阶段触发缓冲区溢出,导致远程代码执行(以 root 权限)。所有版本受影响,修复预计于 2026 年 4 月 1 日前发布。建议停用服务或限制访问以缓解风险。 2026-3-18 05:6:0 Author: thehackernews.com(查看原文) 阅读量:9 收藏

Vulnerability / Data Protection

Cybersecurity researchers have disclosed a critical security flaw impacting the GNU InetUtils telnet daemon (telnetd) that could be exploited by an unauthenticated remote attacker to execute arbitrary code with elevated privileges.

The vulnerability, tracked as CVE-2026-32746, carries a CVSS score of 9.8 out of 10.0. It has been described as a case of out-of-bounds write in the LINEMODE Set Local Characters (SLC) suboption handler that results in a buffer overflow, ultimately paving the way for code execution.

Israeli cybersecurity company Dream, which discovered and reported the flaw on March 11, 2026, said it affects all versions of the Telnet service implementation through 2.7. A fix for the vulnerability is expected to be available no later than April 1, 2026.

"An unauthenticated remote attacker can exploit this by sending a specially crafted message during the initial connection handshake — before any login prompt appears," Dream said in an alert. "Successful exploitation can result in remote code execution as root."

"A single network connection to port 23 is sufficient to trigger the vulnerability. No credentials, no user interaction, and no special network position are required."

The SLC handler, per Dream, processes option negotiation during the Telnet protocol handshake. But given that the flaw can be triggered before authentication, an attacker can weaponize it immediately after establishing a connection by sending specially crafted protocol messages.

Successful exploitation could result in complete system compromise if telnetd runs with root privileges. This, in turn, could open the door to various post-exploitation actions, including the deployment of persistent backdoors, data exfiltration, and lateral movement by using the compromised hosts as pivot points.

"An unauthenticated attacker can trigger it by connecting to port 23 and sending a crafted SLC suboption with many triplets," according to Dream security researcher Adiel Sol.

"No login is required; the bug is hit during option negotiation, before the login prompt. The overflow corrupts memory and can be turned into arbitrary writes. In practice, this can lead to remote code execution. Because telnetd usually runs as root (e.g., under inetd or xinetd), a successful exploit would give the attacker full control of the system."

In the absence of a fix, it's advised to disable the service if it's not necessary, run telnetd without root privileges where required, block port 23 at the network perimeter and host-based firewall level to restrict access, and isolate Telnet access.

The disclosure comes nearly two months after another critical security flaw was disclosed in GNU InetUtils telnetd (CVE-2026-24061, CVSS score: 9.8) that could be leveraged to gain root access to a target system. The vulnerability has since come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/critical-telnetd-flaw-cve-2026-32746.html
如有侵权请联系:admin#unsafe.sh