Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Organizations Warned of Exploited Linux Vulnerabilities

Organizations Warned of Exploited Linux Vulnerabilities

Posted on January 27, 2026January 27, 2026 By CWS

The US cybersecurity company CISA on Monday expanded the Recognized Exploited Vulnerabilities (KEV) catalog with 5 flaws, together with two Linux bugs.

The primary Linux difficulty is CVE-2026-24061 (CVSS rating of 9.8), a critical-severity defect in GNU Inetutils that has been exploited inside days of its public disclosure final week.

It’s an authentication bypass within the GNU telnetd service, which doesn’t sanitize the USER surroundings variable earlier than passing it to the login perform.

The USER surroundings variable is used to pre-fill the username used for authentication and, as a result of an attacker can management it by way of the Telnet protocol, the attacker can provide an ‘-f’ flag to bypass authentication.

An attacker can exploit the bug by sending crafted Telnet instructions to set the USER variable, bypass authentication, and procure a root shell, gaining distant code execution (RCE) on weak programs, SafeBreach explains.

CVE-2026-24061 was launched in GNU Inetutils model 1.9.3, which was launched in Could 2015, and impacts all iterations as much as and together with model 2.7, which was rolled out in December 2025.Commercial. Scroll to proceed studying.

Inside days of the flaw’s public disclosure on January 20, GreyNoise reported seeing 60 exploitation makes an attempt from 18 distinctive assault sources. The assaults concerned reconnaissance, SSH persistence, and malware deployment.

As SafeBreach factors out, greater than 200,000 programs have a Telnet service uncovered to the web (or over 1 million, per Censys), however solely these utilizing the GNU telnetd service are weak.

The second Linux difficulty added to the KEV catalog this week is CVE-2018-14634 (CVSS rating of seven.8), an integer overflow vulnerability within the kernel that would enable an attacker with entry to a privileged binary to escalate their privileges to root.

Qualys, which found and reported the vulnerability, stated in September 2018 that exploitation was attainable on programs with not less than 32GB of RAM, as a consequence of assault necessities.

There look like no studies of CVE-2018-14634’s in-the-wild exploitation previous to CISA’s warning.

On Monday, CISA additionally added to the KEV catalog two SmarterMail bugs reported as exploited final week, and a Microsoft Workplace zero-day, urging federal companies to deal with all 5 bugs by February 16.

Associated: Organizations Warned of Exploited Zimbra Collaboration Vulnerability

Associated: Cisco Patches Vulnerability Exploited by Chinese language Hackers

Associated: Crucial HPE OneView Vulnerability Exploited in Assaults

Associated: WatchGuard Patches Firebox Zero-Day Exploited within the Wild

Security Week News Tags:Exploited, Linux, Organizations, Vulnerabilities, Warned

Post navigation

Previous Post: Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet Formulas
Next Post: Prioritization, Validation, and Outcomes That Matter

Related Posts

 Million Offered for WhatsApp Exploit at Pwn2Own Ireland 2025 $1 Million Offered for WhatsApp Exploit at Pwn2Own Ireland 2025 Security Week News
Fortinet, Ivanti Release August 2025 Security Patches Fortinet, Ivanti Release August 2025 Security Patches Security Week News
Australia Sanctions Hackers Supporting North Korea’s Weapons Program Australia Sanctions Hackers Supporting North Korea’s Weapons Program Security Week News
Ivanti Patches Two EPMM Zero-Days Exploited to Hack Customers Ivanti Patches Two EPMM Zero-Days Exploited to Hack Customers Security Week News
Novel Technique Reveals Vehicle Tracking via Tire Sensors Novel Technique Reveals Vehicle Tracking via Tire Sensors Security Week News
Ransomware Attack Disrupts Local Emergency Alert System Across US Ransomware Attack Disrupts Local Emergency Alert System Across US Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark