Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Organizations Warned of Exploited Linux Vulnerabilities

Posted on January 27, 2026January 27, 2026 By CWS

The US cybersecurity company CISA on Monday expanded the Recognized Exploited Vulnerabilities (KEV) catalog with 5 flaws, together with two Linux bugs.

The primary Linux difficulty is CVE-2026-24061 (CVSS rating of 9.8), a critical-severity defect in GNU Inetutils that has been exploited inside days of its public disclosure final week.

It’s an authentication bypass within the GNU telnetd service, which doesn’t sanitize the USER surroundings variable earlier than passing it to the login perform.

The USER surroundings variable is used to pre-fill the username used for authentication and, as a result of an attacker can management it by way of the Telnet protocol, the attacker can provide an ‘-f’ flag to bypass authentication.

An attacker can exploit the bug by sending crafted Telnet instructions to set the USER variable, bypass authentication, and procure a root shell, gaining distant code execution (RCE) on weak programs, SafeBreach explains.

CVE-2026-24061 was launched in GNU Inetutils model 1.9.3, which was launched in Could 2015, and impacts all iterations as much as and together with model 2.7, which was rolled out in December 2025.Commercial. Scroll to proceed studying.

Inside days of the flaw’s public disclosure on January 20, GreyNoise reported seeing 60 exploitation makes an attempt from 18 distinctive assault sources. The assaults concerned reconnaissance, SSH persistence, and malware deployment.

As SafeBreach factors out, greater than 200,000 programs have a Telnet service uncovered to the web (or over 1 million, per Censys), however solely these utilizing the GNU telnetd service are weak.

The second Linux difficulty added to the KEV catalog this week is CVE-2018-14634 (CVSS rating of seven.8), an integer overflow vulnerability within the kernel that would enable an attacker with entry to a privileged binary to escalate their privileges to root.

Qualys, which found and reported the vulnerability, stated in September 2018 that exploitation was attainable on programs with not less than 32GB of RAM, as a consequence of assault necessities.

There look like no studies of CVE-2018-14634’s in-the-wild exploitation previous to CISA’s warning.

On Monday, CISA additionally added to the KEV catalog two SmarterMail bugs reported as exploited final week, and a Microsoft Workplace zero-day, urging federal companies to deal with all 5 bugs by February 16.

Associated: Organizations Warned of Exploited Zimbra Collaboration Vulnerability

Associated: Cisco Patches Vulnerability Exploited by Chinese language Hackers

Associated: Crucial HPE OneView Vulnerability Exploited in Assaults

Associated: WatchGuard Patches Firebox Zero-Day Exploited within the Wild

Security Week News Tags:Exploited, Linux, Organizations, Vulnerabilities, Warned

Post navigation

Previous Post: Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet Formulas
Next Post: Prioritization, Validation, and Outcomes That Matter

Related Posts

Trustifi Raises $25 Million for AI-Powered Email Security Security Week News
vBulletin Vulnerability Exploited in the Wild Security Week News
Turla and Gamaredon Working Together in Fresh Ukrainian Intrusions Security Week News
Healthcare Services Group Data Breach Impacts 624,000 Security Week News
In Other News: Scammers Abuse Grok, US Manufacturing Attacks, Gmail Security Claims Debunked Security Week News
Zip Security Raises $13.5 Million in Series A Funding Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ‘PackageGate’ Flaws Open JavaScript Ecosystem to Supply Chain Attacks
  • Cyber Insights 2026: Quantum Computing and the Potential Synergy With Advanced AI
  • Chrome, Edge Extensions Caught Stealing ChatGPT Sessions
  • Prioritization, Validation, and Outcomes That Matter
  • Organizations Warned of Exploited Linux Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ‘PackageGate’ Flaws Open JavaScript Ecosystem to Supply Chain Attacks
  • Cyber Insights 2026: Quantum Computing and the Potential Synergy With Advanced AI
  • Chrome, Edge Extensions Caught Stealing ChatGPT Sessions
  • Prioritization, Validation, and Outcomes That Matter
  • Organizations Warned of Exploited Linux Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark