CVE-2026-24061
CVSS Score
9.8
EPSS Score
75.6%
EPSS Percentile
99th
telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.
| CWE | CWE-88 |
| Vendor | gnu |
| Product | inetutils |
| Published | Jan 21, 2026 |
| Last Updated | Mar 25, 2026 |
โ ๏ธ Actively Exploited โ Act Now
Get instant alerts for gnu inetutils
This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2026-24061.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
GNU / Inetutils
1.9.3 โค 2.7
References
openwall.com: https://www.openwall.com/lists/oss-security/2026/01/20/2 openwall.com: https://www.openwall.com/lists/oss-security/2026/01/20/8 gnu.org: https://www.gnu.org/software/inetutils/ lists.gnu.org: https://lists.gnu.org/archive/html/bug-inetutils/2026-01/msg00004.html codeberg.org: https://codeberg.org/inetutils/inetutils/commit/fd702c02497b2f398e739e3119bed0b23dd7aa7b codeberg.org: https://codeberg.org/inetutils/inetutils/commit/ccba9f748aa8d50a38d7748e2e60362edd6a32cc vicarius.io: https://www.vicarius.io/vsociety/posts/cve-2026-24061-detection-script-remote-authentication-bypass-in-gnu-inetutils-package vicarius.io: https://www.vicarius.io/vsociety/posts/cve-2026-24061-mitigation-script-remote-authentication-bypass-in-gnu-inetutils-package openwall.com: https://www.openwall.com/lists/oss-security/2026/01/20/2#:~:[email protected]%3A~%20USER=' labs.greynoise.io: https://www.labs.greynoise.io/grimoire/2026-01-22-f-around-and-find-out-18-hours-of-unsolicited-houseguests/index.html cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-24061 openwall.com: http://www.openwall.com/lists/oss-security/2026/01/22/1 lists.debian.org: https://lists.debian.org/debian-lts-announce/2026/01/msg00025.html