Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Organizations Warned of Exploited Linux Vulnerabilities

Organizations Warned of Exploited Linux Vulnerabilities

Posted on January 27, 2026January 27, 2026 By CWS

The US cybersecurity company CISA on Monday expanded the Recognized Exploited Vulnerabilities (KEV) catalog with 5 flaws, together with two Linux bugs.

The primary Linux difficulty is CVE-2026-24061 (CVSS rating of 9.8), a critical-severity defect in GNU Inetutils that has been exploited inside days of its public disclosure final week.

It’s an authentication bypass within the GNU telnetd service, which doesn’t sanitize the USER surroundings variable earlier than passing it to the login perform.

The USER surroundings variable is used to pre-fill the username used for authentication and, as a result of an attacker can management it by way of the Telnet protocol, the attacker can provide an ‘-f’ flag to bypass authentication.

An attacker can exploit the bug by sending crafted Telnet instructions to set the USER variable, bypass authentication, and procure a root shell, gaining distant code execution (RCE) on weak programs, SafeBreach explains.

CVE-2026-24061 was launched in GNU Inetutils model 1.9.3, which was launched in Could 2015, and impacts all iterations as much as and together with model 2.7, which was rolled out in December 2025.Commercial. Scroll to proceed studying.

Inside days of the flaw’s public disclosure on January 20, GreyNoise reported seeing 60 exploitation makes an attempt from 18 distinctive assault sources. The assaults concerned reconnaissance, SSH persistence, and malware deployment.

As SafeBreach factors out, greater than 200,000 programs have a Telnet service uncovered to the web (or over 1 million, per Censys), however solely these utilizing the GNU telnetd service are weak.

The second Linux difficulty added to the KEV catalog this week is CVE-2018-14634 (CVSS rating of seven.8), an integer overflow vulnerability within the kernel that would enable an attacker with entry to a privileged binary to escalate their privileges to root.

Qualys, which found and reported the vulnerability, stated in September 2018 that exploitation was attainable on programs with not less than 32GB of RAM, as a consequence of assault necessities.

There look like no studies of CVE-2018-14634’s in-the-wild exploitation previous to CISA’s warning.

On Monday, CISA additionally added to the KEV catalog two SmarterMail bugs reported as exploited final week, and a Microsoft Workplace zero-day, urging federal companies to deal with all 5 bugs by February 16.

Associated: Organizations Warned of Exploited Zimbra Collaboration Vulnerability

Associated: Cisco Patches Vulnerability Exploited by Chinese language Hackers

Associated: Crucial HPE OneView Vulnerability Exploited in Assaults

Associated: WatchGuard Patches Firebox Zero-Day Exploited within the Wild

Security Week News Tags:Exploited, Linux, Organizations, Vulnerabilities, Warned

Post navigation

Previous Post: Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet Formulas
Next Post: Prioritization, Validation, and Outcomes That Matter

Related Posts

No Patches for Vulnerabilities Allowing Cognex Industrial Camera Hacking No Patches for Vulnerabilities Allowing Cognex Industrial Camera Hacking Security Week News
Linux Security: New Flaws Allow Root Access, CISA Warns of Old Bug Exploitation Linux Security: New Flaws Allow Root Access, CISA Warns of Old Bug Exploitation Security Week News
Matters.AI Raises .25 Million to Safeguard Enterprise Data Matters.AI Raises $6.25 Million to Safeguard Enterprise Data Security Week News
Microsoft Names New Operating CISOs in Strategic Move to Strengthen Cyberdefense Microsoft Names New Operating CISOs in Strategic Move to Strengthen Cyberdefense Security Week News
F5 Blames Nation-State Hackers for Theft of Source Code and Vulnerability Data F5 Blames Nation-State Hackers for Theft of Source Code and Vulnerability Data Security Week News
6G Network Security Principles Unveiled by Global Coalition 6G Network Security Principles Unveiled by Global Coalition Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark