Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Darkly)
  • No Skin
Collapse
Brand Logo
  1. Home
  2. Uncategorized
  3. I'm just reading this GNU telnetd CVE from last month.

I'm just reading this GNU telnetd CVE from last month.

Scheduled Pinned Locked Moved Uncategorized
14 Posts 9 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • Waldo JaquithW Waldo Jaquith

    I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

    Waldo JaquithW This user is from outside of this forum
    Waldo JaquithW This user is from outside of this forum
    Waldo Jaquith
    wrote last edited by
    #2

    Don't miss this explanation of how backbone providers coordinated on this telnetd exploit in advance of the CVE release, and simply blocked port 23 traffic. https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/

    John KristoffJ 1 Reply Last reply
    0
    • Waldo JaquithW Waldo Jaquith

      I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

      Hoarse e-Books2 This user is from outside of this forum
      Hoarse e-Books2 This user is from outside of this forum
      Hoarse e-Books
      wrote last edited by
      #3

      @waldoj That seems … bad.

      1 Reply Last reply
      0
      • Waldo JaquithW Waldo Jaquith

        Don't miss this explanation of how backbone providers coordinated on this telnetd exploit in advance of the CVE release, and simply blocked port 23 traffic. https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/

        John KristoffJ This user is from outside of this forum
        John KristoffJ This user is from outside of this forum
        John Kristoff
        wrote last edited by
        #4

        @waldoj I'm not aware of any backbone provider coordination. That rarely happens for blocking anything - and probably the only time I can even recall there was such a widely coordinated port block was with Slammer over 20 years ago.

        Another viewpoint here: https://www.terracenetworks.com/blog/2026-02-11-telnet-routing

        Waldo JaquithW 1 Reply Last reply
        0
        • John KristoffJ John Kristoff

          @waldoj I'm not aware of any backbone provider coordination. That rarely happens for blocking anything - and probably the only time I can even recall there was such a widely coordinated port block was with Slammer over 20 years ago.

          Another viewpoint here: https://www.terracenetworks.com/blog/2026-02-11-telnet-routing

          Waldo JaquithW This user is from outside of this forum
          Waldo JaquithW This user is from outside of this forum
          Waldo Jaquith
          wrote last edited by
          #5

          @jtk Interesting!

          1 Reply Last reply
          0
          • Waldo JaquithW Waldo Jaquith

            I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

            Carl MalamudC This user is from outside of this forum
            Carl MalamudC This user is from outside of this forum
            Carl Malamud
            wrote last edited by
            #6

            @waldoj @joebeone omg.

            1 Reply Last reply
            0
            • Waldo JaquithW Waldo Jaquith

              I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

              Paul_IPv6P This user is from outside of this forum
              Paul_IPv6P This user is from outside of this forum
              Paul_IPv6
              wrote last edited by
              #7

              @waldoj

              my first reaction when i read this was "who uses telnet these days" but then realized that this is probably exactly why no one was fixing bugs in telnetd.

              John TimaeusJ 1 Reply Last reply
              0
              • Waldo JaquithW Waldo Jaquith

                I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

                AkaSci 🛰️A This user is from outside of this forum
                AkaSci 🛰️A This user is from outside of this forum
                AkaSci 🛰️
                wrote last edited by
                #8

                @waldoj
                I suppose most orgs don’t run telnetd on their servers.

                Waldo JaquithW 1 Reply Last reply
                0
                • Waldo JaquithW Waldo Jaquith

                  I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

                  der.hansL This user is from outside of this forum
                  der.hansL This user is from outside of this forum
                  der.hans
                  wrote last edited by
                  #9

                  @waldoj *Wow*, telnetd has been a thing the last 11 years?

                  telnet client[0], sure, but telnet daemon?

                  [0] Yeah, yeah, there are other tools now, but my fingers have typed telnet before I've thought of something else or figured out how to spell netcat 🙂

                  1 Reply Last reply
                  0
                  • AkaSci 🛰️A AkaSci 🛰️

                    @waldoj
                    I suppose most orgs don’t run telnetd on their servers.

                    Waldo JaquithW This user is from outside of this forum
                    Waldo JaquithW This user is from outside of this forum
                    Waldo Jaquith
                    wrote last edited by
                    #10

                    @AkaSci Boy, I hope not

                    1 Reply Last reply
                    0
                    • Paul_IPv6P Paul_IPv6

                      @waldoj

                      my first reaction when i read this was "who uses telnet these days" but then realized that this is probably exactly why no one was fixing bugs in telnetd.

                      John TimaeusJ This user is from outside of this forum
                      John TimaeusJ This user is from outside of this forum
                      John Timaeus
                      wrote last edited by
                      #11

                      @paul_ipv6 @waldoj

                      I recently heard about a major ICS/OT gear mfg that ships all end devices with telnet open and well known default creds..."for initial configuration."

                      Paul_IPv6P 1 Reply Last reply
                      0
                      • John TimaeusJ John Timaeus

                        @paul_ipv6 @waldoj

                        I recently heard about a major ICS/OT gear mfg that ships all end devices with telnet open and well known default creds..."for initial configuration."

                        Paul_IPv6P This user is from outside of this forum
                        Paul_IPv6P This user is from outside of this forum
                        Paul_IPv6
                        wrote last edited by
                        #12

                        @johntimaeus @waldoj

                        RIPE did a document with recommendations for edge devices, including not having default passwords, requiring setting a decent password before starting to route packets, etc. in the early 1990s. sad that vendors are still shipping vulnerable boxes...

                        John TimaeusJ 1 Reply Last reply
                        0
                        • Paul_IPv6P Paul_IPv6

                          @johntimaeus @waldoj

                          RIPE did a document with recommendations for edge devices, including not having default passwords, requiring setting a decent password before starting to route packets, etc. in the early 1990s. sad that vendors are still shipping vulnerable boxes...

                          John TimaeusJ This user is from outside of this forum
                          John TimaeusJ This user is from outside of this forum
                          John Timaeus
                          wrote last edited by
                          #13

                          @paul_ipv6 @waldoj

                          Grid control devices.

                          Of course they will never be connected to the internet because segmentation works.

                          @vncresolver

                          1 Reply Last reply
                          0
                          • Waldo JaquithW Waldo Jaquith

                            I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

                            matthew greenM This user is from outside of this forum
                            matthew greenM This user is from outside of this forum
                            matthew green
                            wrote last edited by
                            #14

                            @waldoj this was a bug implemented many times across many telnet daemons. the first instance was in the 80s...

                            1 Reply Last reply
                            0
                            • R ActivityRelay shared this topic
                            Reply
                            • Reply as topic
                            Log in to reply
                            • Oldest to Newest
                            • Newest to Oldest
                            • Most Votes


                            • Login

                            • Don't have an account? Register

                            • Login or register to search.
                            Powered by NodeBB Contributors
                            • First post
                              Last post
                            0
                            • Categories
                            • Recent
                            • Tags
                            • Popular
                            • World
                            • Users
                            • Groups