11-Year-Old critical telnetd flaw found in GNU InetUtils (CVE-2026-24061)
Overview
Researchers have discovered a critical vulnerability in the GNU InetUtils telnet daemon (telnetd), tracked as CVE-2026-24061, which has remained unnoticed for nearly 11 years. This flaw affects all versions from 1.9.3 to 2.7 and has a high severity score of 9.8, indicating a significant risk. If exploited, attackers could gain root access to affected systems, posing a serious threat to security. This vulnerability impacts a variety of systems that rely on GNU InetUtils, making it imperative for users and organizations to address this issue promptly. As this flaw has been present for so long, it raises concerns about the security practices in place for maintaining software.
Key Takeaways
- Affected Systems: GNU InetUtils versions 1.9.3 to 2.7
- Action Required: Users should upgrade to a patched version of GNU InetUtils to mitigate this vulnerability.
- Timeline: Disclosed on October 2023
Original Article Summary
Critical telnetd flaw CVE-2026-24061 (CVSS 9.8) affects all GNU InetUtils versions 1.9.3–2.7 and went unnoticed for nearly 11 years. A critical vulnerability, tracked as CVE-2026-24061 (CVSS score of 9.8), in the GNU InetUtils telnet daemon (telnetd) impacts all versions from 1.9.3 to 2.7. The vulnerability can be exploited to gain root access on affected systems. […]
Impact
GNU InetUtils versions 1.9.3 to 2.7
Exploitation Status
The exploitation status is currently unknown. Monitor vendor advisories and security bulletins for updates.
Timeline
Disclosed on October 2023
Remediation
Users should upgrade to a patched version of GNU InetUtils to mitigate this vulnerability. It is crucial to check for any available updates or patches that address CVE-2026-24061.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to CVE, Vulnerability, Critical.