Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Telnet Flaw Exposes Root Access Vulnerability

Critical Telnet Flaw Exposes Root Access Vulnerability

Posted on February 26, 2026 By CWS

Critical Vulnerability in Telnetd

A long-standing security flaw in the telnet daemon of GNU Inetutils has resurfaced, posing a significant threat to system security. This vulnerability, identified as CVE-2026-24061, allows attackers to gain root access by exploiting unfiltered environment variables. The flaw, which dates back 27 years, requires no authentication, making it particularly dangerous.

Exploiting the CVE-2026-24061 Flaw

The vulnerability exists in GNU Inetutils versions up to 2.7, enabling remote bypass of authentication using the ‘-f root’ parameter within the USER environment variable. Security researcher Ron Ben Yizhak’s findings have confirmed that this vulnerability mirrors the infamous CVE-1999-0073, which allowed attackers to manipulate environment variables to compromise system libraries.

The core issue stems from the way telnetd initiates the /bin/login process. Both processes operate under root permissions, causing the Linux kernel to set AT_SECURE to 0, which inadvertently trusts all incoming environment variables. This lack of security prompts the dynamic linker to accept potentially harmful variables without proper sanitation.

Incomplete Fixes and Potential Exploits

A recent code update attempted to mitigate the issue by removing the CREDENTIALS_DIRECTORY variable. However, the fix is incomplete and relies on a blacklist approach to filter environment variables. This method has proved ineffective, as malicious variables like OUTPUT_CHARSET and GCONV_PATH can still be injected to exploit the system.

In a proof of concept by Justin Swartz, a low-privileged user exploited this vulnerability by injecting environment variables to load a malicious library, resulting in unauthorized root access. The demonstration highlighted the vulnerability’s potential for severe security breaches.

Recommended Security Measures

Experts recommend moving away from the flawed blacklist model to a more robust whitelist approach, similar to OpenSSH’s AcceptEnv strategy. This involves allowing only safe, predefined environment variables for /bin/login and implementing stringent input sanitization.

Organizations still using telnet services should disable telnetd immediately and transition to more secure protocols like SSH. For systems where telnet is unavoidable, upgrading GNU Inetutils and enforcing strict network access controls is crucial until a comprehensive security patch is available.

Stay informed on the latest cybersecurity developments by following us on Google News, LinkedIn, and X. Reach out to us for more information or to share your stories.

Cyber Security News Tags:authentication bypass, CVE-2026-24061, Cybersecurity, environment variables, GNU Inetutils, network security, root access, security flaw, Telnet, Vulnerability

Post navigation

Previous Post: Zyxel Resolves Critical Security Flaw in Multiple Devices
Next Post: Malicious NuGet Package Targets Financial Sector

Related Posts

GhostContainer Malware Hacking Exchange Servers in the Wild Using N-day Vulnerability GhostContainer Malware Hacking Exchange Servers in the Wild Using N-day Vulnerability Cyber Security News
Critical VMware Aria Flaws Enable Remote Code Attacks Critical VMware Aria Flaws Enable Remote Code Attacks Cyber Security News
VMware Workstation and Fusion 25H2 Released with New Features and Latest OS Support VMware Workstation and Fusion 25H2 Released with New Features and Latest OS Support Cyber Security News
5 Must-Follow Rules of Every Elite SOC: CISO’s Checklist 5 Must-Follow Rules of Every Elite SOC: CISO’s Checklist Cyber Security News
Hackers Actively Exploiting WordPress Plugin Vulnerability to Gain Admin Access Hackers Actively Exploiting WordPress Plugin Vulnerability to Gain Admin Access Cyber Security News
Critical SOQL Injection 0-Day Vulnerability in Salesforce Affects Millions Worldwide Critical SOQL Injection 0-Day Vulnerability in Salesforce Affects Millions Worldwide Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • DarkCloud Malware Threatens Enterprises with Credential Theft
  • ServiceNow AI Platform Patch Fixes Critical RCE Vulnerability
  • Security Flaws in Claude Code Exposed Developer Systems
  • Act Now: Prepare for Post-Quantum Cryptography
  • Chinese Hackers Exploit ChatGPT for Global Cyber Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • DarkCloud Malware Threatens Enterprises with Credential Theft
  • ServiceNow AI Platform Patch Fixes Critical RCE Vulnerability
  • Security Flaws in Claude Code Exposed Developer Systems
  • Act Now: Prepare for Post-Quantum Cryptography
  • Chinese Hackers Exploit ChatGPT for Global Cyber Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News