Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I'm just reading this GNU telnetd CVE from last month.

I'm just reading this GNU telnetd CVE from last month.

Scheduled Pinned Locked Moved Uncategorized
14 Posts 9 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • waldoj@mastodon.socialW waldoj@mastodon.social

    I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

    20002ist@thepit.social2 This user is from outside of this forum
    20002ist@thepit.social2 This user is from outside of this forum
    20002ist@thepit.social
    wrote last edited by
    #3

    @waldoj That seems … bad.

    1 Reply Last reply
    0
    • waldoj@mastodon.socialW waldoj@mastodon.social

      Don't miss this explanation of how backbone providers coordinated on this telnetd exploit in advance of the CVE release, and simply blocked port 23 traffic. https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/

      jtk@infosec.exchangeJ This user is from outside of this forum
      jtk@infosec.exchangeJ This user is from outside of this forum
      jtk@infosec.exchange
      wrote last edited by
      #4

      @waldoj I'm not aware of any backbone provider coordination. That rarely happens for blocking anything - and probably the only time I can even recall there was such a widely coordinated port block was with Slammer over 20 years ago.

      Another viewpoint here: https://www.terracenetworks.com/blog/2026-02-11-telnet-routing

      waldoj@mastodon.socialW 1 Reply Last reply
      0
      • jtk@infosec.exchangeJ jtk@infosec.exchange

        @waldoj I'm not aware of any backbone provider coordination. That rarely happens for blocking anything - and probably the only time I can even recall there was such a widely coordinated port block was with Slammer over 20 years ago.

        Another viewpoint here: https://www.terracenetworks.com/blog/2026-02-11-telnet-routing

        waldoj@mastodon.socialW This user is from outside of this forum
        waldoj@mastodon.socialW This user is from outside of this forum
        waldoj@mastodon.social
        wrote last edited by
        #5

        @jtk Interesting!

        1 Reply Last reply
        0
        • waldoj@mastodon.socialW waldoj@mastodon.social

          I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

          carlmalamud@official.resource.orgC This user is from outside of this forum
          carlmalamud@official.resource.orgC This user is from outside of this forum
          carlmalamud@official.resource.org
          wrote last edited by
          #6

          @waldoj @joebeone omg.

          1 Reply Last reply
          0
          • waldoj@mastodon.socialW waldoj@mastodon.social

            I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

            paul_ipv6@infosec.exchangeP This user is from outside of this forum
            paul_ipv6@infosec.exchangeP This user is from outside of this forum
            paul_ipv6@infosec.exchange
            wrote last edited by
            #7

            @waldoj

            my first reaction when i read this was "who uses telnet these days" but then realized that this is probably exactly why no one was fixing bugs in telnetd.

            johntimaeus@infosec.exchangeJ 1 Reply Last reply
            0
            • waldoj@mastodon.socialW waldoj@mastodon.social

              I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

              akasci@fosstodon.orgA This user is from outside of this forum
              akasci@fosstodon.orgA This user is from outside of this forum
              akasci@fosstodon.org
              wrote last edited by
              #8

              @waldoj
              I suppose most orgs don’t run telnetd on their servers.

              waldoj@mastodon.socialW 1 Reply Last reply
              0
              • waldoj@mastodon.socialW waldoj@mastodon.social

                I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

                lufthans@mastodon.socialL This user is from outside of this forum
                lufthans@mastodon.socialL This user is from outside of this forum
                lufthans@mastodon.social
                wrote last edited by
                #9

                @waldoj *Wow*, telnetd has been a thing the last 11 years?

                telnet client[0], sure, but telnet daemon?

                [0] Yeah, yeah, there are other tools now, but my fingers have typed telnet before I've thought of something else or figured out how to spell netcat 🙂

                1 Reply Last reply
                0
                • akasci@fosstodon.orgA akasci@fosstodon.org

                  @waldoj
                  I suppose most orgs don’t run telnetd on their servers.

                  waldoj@mastodon.socialW This user is from outside of this forum
                  waldoj@mastodon.socialW This user is from outside of this forum
                  waldoj@mastodon.social
                  wrote last edited by
                  #10

                  @AkaSci Boy, I hope not

                  1 Reply Last reply
                  0
                  • paul_ipv6@infosec.exchangeP paul_ipv6@infosec.exchange

                    @waldoj

                    my first reaction when i read this was "who uses telnet these days" but then realized that this is probably exactly why no one was fixing bugs in telnetd.

                    johntimaeus@infosec.exchangeJ This user is from outside of this forum
                    johntimaeus@infosec.exchangeJ This user is from outside of this forum
                    johntimaeus@infosec.exchange
                    wrote last edited by
                    #11

                    @paul_ipv6 @waldoj

                    I recently heard about a major ICS/OT gear mfg that ships all end devices with telnet open and well known default creds..."for initial configuration."

                    paul_ipv6@infosec.exchangeP 1 Reply Last reply
                    0
                    • johntimaeus@infosec.exchangeJ johntimaeus@infosec.exchange

                      @paul_ipv6 @waldoj

                      I recently heard about a major ICS/OT gear mfg that ships all end devices with telnet open and well known default creds..."for initial configuration."

                      paul_ipv6@infosec.exchangeP This user is from outside of this forum
                      paul_ipv6@infosec.exchangeP This user is from outside of this forum
                      paul_ipv6@infosec.exchange
                      wrote last edited by
                      #12

                      @johntimaeus @waldoj

                      RIPE did a document with recommendations for edge devices, including not having default passwords, requiring setting a decent password before starting to route packets, etc. in the early 1990s. sad that vendors are still shipping vulnerable boxes...

                      johntimaeus@infosec.exchangeJ 1 Reply Last reply
                      0
                      • paul_ipv6@infosec.exchangeP paul_ipv6@infosec.exchange

                        @johntimaeus @waldoj

                        RIPE did a document with recommendations for edge devices, including not having default passwords, requiring setting a decent password before starting to route packets, etc. in the early 1990s. sad that vendors are still shipping vulnerable boxes...

                        johntimaeus@infosec.exchangeJ This user is from outside of this forum
                        johntimaeus@infosec.exchangeJ This user is from outside of this forum
                        johntimaeus@infosec.exchange
                        wrote last edited by
                        #13

                        @paul_ipv6 @waldoj

                        Grid control devices.

                        Of course they will never be connected to the internet because segmentation works.

                        @vncresolver

                        1 Reply Last reply
                        0
                        • waldoj@mastodon.socialW waldoj@mastodon.social

                          I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

                          mrgtwentythree@mastodon.sdf.orgM This user is from outside of this forum
                          mrgtwentythree@mastodon.sdf.orgM This user is from outside of this forum
                          mrgtwentythree@mastodon.sdf.org
                          wrote last edited by
                          #14

                          @waldoj this was a bug implemented many times across many telnet daemons. the first instance was in the 80s...

                          1 Reply Last reply
                          0
                          • R relay@relay.an.exchange shared this topic
                          Reply
                          • Reply as topic
                          Log in to reply
                          • Oldest to Newest
                          • Newest to Oldest
                          • Most Votes


                          • Login

                          • Login or register to search.
                          • First post
                            Last post
                          0
                          • Categories
                          • Recent
                          • Tags
                          • Popular
                          • World
                          • Users
                          • Groups