๐Ÿ” CVE Alert

CVE-2026-24061

CRITICAL 9.8 โš ๏ธ CISA KEV
CVSS Score
9.8
EPSS Score
75.6%
EPSS Percentile
99th

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

CWE CWE-88
Vendor gnu
Product inetutils
Published Jan 21, 2026
Last Updated Mar 25, 2026
โš ๏ธ Actively Exploited โ€” Act Now

Get instant alerts for gnu inetutils

This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2026-24061.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

GNU / Inetutils
1.9.3 โ‰ค 2.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
openwall.com: https://www.openwall.com/lists/oss-security/2026/01/20/2 openwall.com: https://www.openwall.com/lists/oss-security/2026/01/20/8 gnu.org: https://www.gnu.org/software/inetutils/ lists.gnu.org: https://lists.gnu.org/archive/html/bug-inetutils/2026-01/msg00004.html codeberg.org: https://codeberg.org/inetutils/inetutils/commit/fd702c02497b2f398e739e3119bed0b23dd7aa7b codeberg.org: https://codeberg.org/inetutils/inetutils/commit/ccba9f748aa8d50a38d7748e2e60362edd6a32cc vicarius.io: https://www.vicarius.io/vsociety/posts/cve-2026-24061-detection-script-remote-authentication-bypass-in-gnu-inetutils-package vicarius.io: https://www.vicarius.io/vsociety/posts/cve-2026-24061-mitigation-script-remote-authentication-bypass-in-gnu-inetutils-package openwall.com: https://www.openwall.com/lists/oss-security/2026/01/20/2#:~:[email protected]%3A~%20USER=' labs.greynoise.io: https://www.labs.greynoise.io/grimoire/2026-01-22-f-around-and-find-out-18-hours-of-unsolicited-houseguests/index.html cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-24061 openwall.com: http://www.openwall.com/lists/oss-security/2026/01/22/1 lists.debian.org: https://lists.debian.org/debian-lts-announce/2026/01/msg00025.html