Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I'm just reading this GNU telnetd CVE from last month.

I'm just reading this GNU telnetd CVE from last month.

Scheduled Pinned Locked Moved Uncategorized
14 Posts 9 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • jtk@infosec.exchangeJ jtk@infosec.exchange

    @waldoj I'm not aware of any backbone provider coordination. That rarely happens for blocking anything - and probably the only time I can even recall there was such a widely coordinated port block was with Slammer over 20 years ago.

    Another viewpoint here: https://www.terracenetworks.com/blog/2026-02-11-telnet-routing

    waldoj@mastodon.socialW This user is from outside of this forum
    waldoj@mastodon.socialW This user is from outside of this forum
    waldoj@mastodon.social
    wrote last edited by
    #5

    @jtk Interesting!

    1 Reply Last reply
    0
    • waldoj@mastodon.socialW waldoj@mastodon.social

      I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

      carlmalamud@official.resource.orgC This user is from outside of this forum
      carlmalamud@official.resource.orgC This user is from outside of this forum
      carlmalamud@official.resource.org
      wrote last edited by
      #6

      @waldoj @joebeone omg.

      1 Reply Last reply
      0
      • waldoj@mastodon.socialW waldoj@mastodon.social

        I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

        paul_ipv6@infosec.exchangeP This user is from outside of this forum
        paul_ipv6@infosec.exchangeP This user is from outside of this forum
        paul_ipv6@infosec.exchange
        wrote last edited by
        #7

        @waldoj

        my first reaction when i read this was "who uses telnet these days" but then realized that this is probably exactly why no one was fixing bugs in telnetd.

        johntimaeus@infosec.exchangeJ 1 Reply Last reply
        0
        • waldoj@mastodon.socialW waldoj@mastodon.social

          I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

          akasci@fosstodon.orgA This user is from outside of this forum
          akasci@fosstodon.orgA This user is from outside of this forum
          akasci@fosstodon.org
          wrote last edited by
          #8

          @waldoj
          I suppose most orgs don’t run telnetd on their servers.

          waldoj@mastodon.socialW 1 Reply Last reply
          0
          • waldoj@mastodon.socialW waldoj@mastodon.social

            I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

            lufthans@mastodon.socialL This user is from outside of this forum
            lufthans@mastodon.socialL This user is from outside of this forum
            lufthans@mastodon.social
            wrote last edited by
            #9

            @waldoj *Wow*, telnetd has been a thing the last 11 years?

            telnet client[0], sure, but telnet daemon?

            [0] Yeah, yeah, there are other tools now, but my fingers have typed telnet before I've thought of something else or figured out how to spell netcat 🙂

            1 Reply Last reply
            0
            • akasci@fosstodon.orgA akasci@fosstodon.org

              @waldoj
              I suppose most orgs don’t run telnetd on their servers.

              waldoj@mastodon.socialW This user is from outside of this forum
              waldoj@mastodon.socialW This user is from outside of this forum
              waldoj@mastodon.social
              wrote last edited by
              #10

              @AkaSci Boy, I hope not

              1 Reply Last reply
              0
              • paul_ipv6@infosec.exchangeP paul_ipv6@infosec.exchange

                @waldoj

                my first reaction when i read this was "who uses telnet these days" but then realized that this is probably exactly why no one was fixing bugs in telnetd.

                johntimaeus@infosec.exchangeJ This user is from outside of this forum
                johntimaeus@infosec.exchangeJ This user is from outside of this forum
                johntimaeus@infosec.exchange
                wrote last edited by
                #11

                @paul_ipv6 @waldoj

                I recently heard about a major ICS/OT gear mfg that ships all end devices with telnet open and well known default creds..."for initial configuration."

                paul_ipv6@infosec.exchangeP 1 Reply Last reply
                0
                • johntimaeus@infosec.exchangeJ johntimaeus@infosec.exchange

                  @paul_ipv6 @waldoj

                  I recently heard about a major ICS/OT gear mfg that ships all end devices with telnet open and well known default creds..."for initial configuration."

                  paul_ipv6@infosec.exchangeP This user is from outside of this forum
                  paul_ipv6@infosec.exchangeP This user is from outside of this forum
                  paul_ipv6@infosec.exchange
                  wrote last edited by
                  #12

                  @johntimaeus @waldoj

                  RIPE did a document with recommendations for edge devices, including not having default passwords, requiring setting a decent password before starting to route packets, etc. in the early 1990s. sad that vendors are still shipping vulnerable boxes...

                  johntimaeus@infosec.exchangeJ 1 Reply Last reply
                  0
                  • paul_ipv6@infosec.exchangeP paul_ipv6@infosec.exchange

                    @johntimaeus @waldoj

                    RIPE did a document with recommendations for edge devices, including not having default passwords, requiring setting a decent password before starting to route packets, etc. in the early 1990s. sad that vendors are still shipping vulnerable boxes...

                    johntimaeus@infosec.exchangeJ This user is from outside of this forum
                    johntimaeus@infosec.exchangeJ This user is from outside of this forum
                    johntimaeus@infosec.exchange
                    wrote last edited by
                    #13

                    @paul_ipv6 @waldoj

                    Grid control devices.

                    Of course they will never be connected to the internet because segmentation works.

                    @vncresolver

                    1 Reply Last reply
                    0
                    • waldoj@mastodon.socialW waldoj@mastodon.social

                      I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

                      mrgtwentythree@mastodon.sdf.orgM This user is from outside of this forum
                      mrgtwentythree@mastodon.sdf.orgM This user is from outside of this forum
                      mrgtwentythree@mastodon.sdf.org
                      wrote last edited by
                      #14

                      @waldoj this was a bug implemented many times across many telnet daemons. the first instance was in the 80s...

                      1 Reply Last reply
                      0
                      • R relay@relay.an.exchange shared this topic
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups