Description
telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.
Published: 2026-01-21
Score: 9.8 Critical
EPSS: 91.1% High
KEV: Yes
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4453-1 inetutils security update
Debian DLA Debian DLA DLA-4527-1 inetutils security update
Debian DSA Debian DSA DSA-6106-1 inetutils security update
Ubuntu USN Ubuntu USN USN-7992-1 Inetutils vulnerability
Ubuntu USN Ubuntu USN USN-7992-2 Inetutils vulnerability
History

Wed, 13 May 2026 16:30:00 +0000

Type Values Removed Values Added
Title Remote Authentication Bypass in telnetd via USER Variable Manipulation

Sat, 02 May 2026 01:15:00 +0000

Type Values Removed Values Added
Title Remote Authentication Bypass in telnetd via USER Variable Manipulation

Wed, 22 Apr 2026 04:15:00 +0000

Type Values Removed Values Added
Title Remote Authentication Bypass in GNU Inetutils Telnetd Using USER Environment Variable

Thu, 16 Apr 2026 08:15:00 +0000

Type Values Removed Values Added
Title Remote Authentication Bypass in GNU Inetutils Telnetd Using USER Environment Variable

Tue, 10 Feb 2026 17:30:00 +0000


Thu, 29 Jan 2026 18:30:00 +0000


Tue, 27 Jan 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Debian
Debian debian Linux
CPEs cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
Vendors & Products Debian
Debian debian Linux

Mon, 26 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2026-01-26T00:00:00+00:00', 'dueDate': '2026-02-16T00:00:00+00:00'}


Sun, 25 Jan 2026 01:30:00 +0000

Type Values Removed Values Added
References

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 21 Jan 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Gnu
Gnu inetutils
CPEs cpe:2.3:a:gnu:inetutils:*:*:*:*:*:*:*:*
Vendors & Products Gnu
Gnu inetutils

Wed, 21 Jan 2026 07:00:00 +0000

Type Values Removed Values Added
Description telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.
Weaknesses CWE-88
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Debian Debian Linux
Gnu Inetutils
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-25T13:31:53.588Z

Reserved: 2026-01-21T06:42:16.865Z

Link: CVE-2026-24061

cve-icon Vulnrichment

Updated: 2026-01-25T00:15:44.959Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-21T07:16:01.597

Modified: 2026-02-11T15:40:42.937

Link: CVE-2026-24061

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T16:15:26Z

Weaknesses