Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical GNU InetUtils Vulnerability Allows Unauthenticated Root Access Via “-f root”

Critical GNU InetUtils Vulnerability Allows Unauthenticated Root Access Via “-f root”

Posted on January 21, 2026January 21, 2026 By CWS

A crucial distant authentication bypass vulnerability has been disclosed in GNU InetUtils affecting the telnetd server element.

The flaw, reported by a safety researcher on January 19, 2026, permits unauthenticated attackers to realize root entry by exploiting improper enter sanitization within the telnetd authentication mechanism.

The vulnerability stems from how telnetd invokes the login program. When a telnet shopper connects, telnetd receives a USER atmosphere variable from the distant shopper and passes it on to /usr/bin/login with out sanitization.

An attacker can craft a malicious USER atmosphere variable containing the string “-f root”, a parameter that login (1) interprets as a flag to bypass routine authentication procedures.

By sending a telnet reference to the specifically crafted USER atmosphere variable utilizing telnet’s -a or –login parameter.

An unauthenticated distant person bypasses the login authentication system solely and positive factors quick root-level entry to the system.

The vulnerability was inadvertently launched throughout a code modification on March 19, 2015, and was included in GNU InetUtils model 1.9.3 launched on Could 12, 2015

 The flaw has persevered by means of all subsequent variations as much as and together with model 2.7. GNU InetUtils variations 1.9.3 by means of 2.7 are weak.

In accordance with OpenWall, organizations working telnetd from GNU InetUtils ought to instantly assess their publicity. GNU maintainers advocate three approaches:

ApproachDescriptionDisable telnetdTurn off telnet resulting from insecurity (most well-liked)Prohibit accessAllow solely trusted clientsUpgrade softwareApply patches by Eggert & Josefsson

This vulnerability demonstrates the persistent dangers related to legacy protocols like telnet.

 The authentication bypass permits full system compromise with root privileges, making this a crucial safety risk for any system that exposes telnetd to untrusted networks.

Organizations ought to prioritize both updating GNU InetUtils or instantly turning off telnetd. The provision of patches implies that delayed remediation considerably will increase the chance of compromise.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Access, Critical, GNU, InetUtils, Root, Unauthenticated, Vulnerability

Post navigation

Previous Post: LastPass Warns of Fake Maintenance Messages Targeting Users’ Master Passwords
Next Post: Google Chrome 144 Update Patches High-Severity V8 Vulnerability

Related Posts

New Wave of Steganography Attacks: Hackers Hiding XWorm in PNGs  New Wave of Steganography Attacks: Hackers Hiding XWorm in PNGs  Cyber Security News
Top 10 Smart Contract Risks in 2026 by OWASP Top 10 Smart Contract Risks in 2026 by OWASP Cyber Security News
Iranian Cyber Attacks Target US Networks, Cameras for Surveillance Iranian Cyber Attacks Target US Networks, Cameras for Surveillance Cyber Security News
Malicious Outlook Add-in Exposes 4,000 Accounts Malicious Outlook Add-in Exposes 4,000 Accounts Cyber Security News
Threat Actor’s Using Copyright Takedown Claims to Deploy Malware Threat Actor’s Using Copyright Takedown Claims to Deploy Malware Cyber Security News
CISA Issues ICS Advisories for Rockwell Automation, VMware, and Güralp Seismic Monitoring Systems CISA Issues ICS Advisories for Rockwell Automation, VMware, and Güralp Seismic Monitoring Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark