Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I'm just reading this GNU telnetd CVE from last month.

I'm just reading this GNU telnetd CVE from last month.

Scheduled Pinned Locked Moved Uncategorized
14 Posts 9 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • waldoj@mastodon.socialW This user is from outside of this forum
    waldoj@mastodon.socialW This user is from outside of this forum
    waldoj@mastodon.social
    wrote last edited by
    #1

    I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

    waldoj@mastodon.socialW 20002ist@thepit.social2 carlmalamud@official.resource.orgC paul_ipv6@infosec.exchangeP akasci@fosstodon.orgA 7 Replies Last reply
    1
    0
    • waldoj@mastodon.socialW waldoj@mastodon.social

      I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

      waldoj@mastodon.socialW This user is from outside of this forum
      waldoj@mastodon.socialW This user is from outside of this forum
      waldoj@mastodon.social
      wrote last edited by
      #2

      Don't miss this explanation of how backbone providers coordinated on this telnetd exploit in advance of the CVE release, and simply blocked port 23 traffic. https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/

      jtk@infosec.exchangeJ 1 Reply Last reply
      0
      • waldoj@mastodon.socialW waldoj@mastodon.social

        I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

        20002ist@thepit.social2 This user is from outside of this forum
        20002ist@thepit.social2 This user is from outside of this forum
        20002ist@thepit.social
        wrote last edited by
        #3

        @waldoj That seems … bad.

        1 Reply Last reply
        0
        • waldoj@mastodon.socialW waldoj@mastodon.social

          Don't miss this explanation of how backbone providers coordinated on this telnetd exploit in advance of the CVE release, and simply blocked port 23 traffic. https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/

          jtk@infosec.exchangeJ This user is from outside of this forum
          jtk@infosec.exchangeJ This user is from outside of this forum
          jtk@infosec.exchange
          wrote last edited by
          #4

          @waldoj I'm not aware of any backbone provider coordination. That rarely happens for blocking anything - and probably the only time I can even recall there was such a widely coordinated port block was with Slammer over 20 years ago.

          Another viewpoint here: https://www.terracenetworks.com/blog/2026-02-11-telnet-routing

          waldoj@mastodon.socialW 1 Reply Last reply
          0
          • jtk@infosec.exchangeJ jtk@infosec.exchange

            @waldoj I'm not aware of any backbone provider coordination. That rarely happens for blocking anything - and probably the only time I can even recall there was such a widely coordinated port block was with Slammer over 20 years ago.

            Another viewpoint here: https://www.terracenetworks.com/blog/2026-02-11-telnet-routing

            waldoj@mastodon.socialW This user is from outside of this forum
            waldoj@mastodon.socialW This user is from outside of this forum
            waldoj@mastodon.social
            wrote last edited by
            #5

            @jtk Interesting!

            1 Reply Last reply
            0
            • waldoj@mastodon.socialW waldoj@mastodon.social

              I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

              carlmalamud@official.resource.orgC This user is from outside of this forum
              carlmalamud@official.resource.orgC This user is from outside of this forum
              carlmalamud@official.resource.org
              wrote last edited by
              #6

              @waldoj @joebeone omg.

              1 Reply Last reply
              0
              • waldoj@mastodon.socialW waldoj@mastodon.social

                I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

                paul_ipv6@infosec.exchangeP This user is from outside of this forum
                paul_ipv6@infosec.exchangeP This user is from outside of this forum
                paul_ipv6@infosec.exchange
                wrote last edited by
                #7

                @waldoj

                my first reaction when i read this was "who uses telnet these days" but then realized that this is probably exactly why no one was fixing bugs in telnetd.

                johntimaeus@infosec.exchangeJ 1 Reply Last reply
                0
                • waldoj@mastodon.socialW waldoj@mastodon.social

                  I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

                  akasci@fosstodon.orgA This user is from outside of this forum
                  akasci@fosstodon.orgA This user is from outside of this forum
                  akasci@fosstodon.org
                  wrote last edited by
                  #8

                  @waldoj
                  I suppose most orgs don’t run telnetd on their servers.

                  waldoj@mastodon.socialW 1 Reply Last reply
                  0
                  • waldoj@mastodon.socialW waldoj@mastodon.social

                    I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

                    lufthans@mastodon.socialL This user is from outside of this forum
                    lufthans@mastodon.socialL This user is from outside of this forum
                    lufthans@mastodon.social
                    wrote last edited by
                    #9

                    @waldoj *Wow*, telnetd has been a thing the last 11 years?

                    telnet client[0], sure, but telnet daemon?

                    [0] Yeah, yeah, there are other tools now, but my fingers have typed telnet before I've thought of something else or figured out how to spell netcat 🙂

                    1 Reply Last reply
                    0
                    • akasci@fosstodon.orgA akasci@fosstodon.org

                      @waldoj
                      I suppose most orgs don’t run telnetd on their servers.

                      waldoj@mastodon.socialW This user is from outside of this forum
                      waldoj@mastodon.socialW This user is from outside of this forum
                      waldoj@mastodon.social
                      wrote last edited by
                      #10

                      @AkaSci Boy, I hope not

                      1 Reply Last reply
                      0
                      • paul_ipv6@infosec.exchangeP paul_ipv6@infosec.exchange

                        @waldoj

                        my first reaction when i read this was "who uses telnet these days" but then realized that this is probably exactly why no one was fixing bugs in telnetd.

                        johntimaeus@infosec.exchangeJ This user is from outside of this forum
                        johntimaeus@infosec.exchangeJ This user is from outside of this forum
                        johntimaeus@infosec.exchange
                        wrote last edited by
                        #11

                        @paul_ipv6 @waldoj

                        I recently heard about a major ICS/OT gear mfg that ships all end devices with telnet open and well known default creds..."for initial configuration."

                        paul_ipv6@infosec.exchangeP 1 Reply Last reply
                        0
                        • johntimaeus@infosec.exchangeJ johntimaeus@infosec.exchange

                          @paul_ipv6 @waldoj

                          I recently heard about a major ICS/OT gear mfg that ships all end devices with telnet open and well known default creds..."for initial configuration."

                          paul_ipv6@infosec.exchangeP This user is from outside of this forum
                          paul_ipv6@infosec.exchangeP This user is from outside of this forum
                          paul_ipv6@infosec.exchange
                          wrote last edited by
                          #12

                          @johntimaeus @waldoj

                          RIPE did a document with recommendations for edge devices, including not having default passwords, requiring setting a decent password before starting to route packets, etc. in the early 1990s. sad that vendors are still shipping vulnerable boxes...

                          johntimaeus@infosec.exchangeJ 1 Reply Last reply
                          0
                          • paul_ipv6@infosec.exchangeP paul_ipv6@infosec.exchange

                            @johntimaeus @waldoj

                            RIPE did a document with recommendations for edge devices, including not having default passwords, requiring setting a decent password before starting to route packets, etc. in the early 1990s. sad that vendors are still shipping vulnerable boxes...

                            johntimaeus@infosec.exchangeJ This user is from outside of this forum
                            johntimaeus@infosec.exchangeJ This user is from outside of this forum
                            johntimaeus@infosec.exchange
                            wrote last edited by
                            #13

                            @paul_ipv6 @waldoj

                            Grid control devices.

                            Of course they will never be connected to the internet because segmentation works.

                            @vncresolver

                            1 Reply Last reply
                            0
                            • waldoj@mastodon.socialW waldoj@mastodon.social

                              I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

                              mrgtwentythree@mastodon.sdf.orgM This user is from outside of this forum
                              mrgtwentythree@mastodon.sdf.orgM This user is from outside of this forum
                              mrgtwentythree@mastodon.sdf.org
                              wrote last edited by
                              #14

                              @waldoj this was a bug implemented many times across many telnet daemons. the first instance was in the 80s...

                              1 Reply Last reply
                              0
                              • R relay@relay.an.exchange shared this topic
                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              • Login

                              • Login or register to search.
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent
                              • Tags
                              • Popular
                              • World
                              • Users
                              • Groups