Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Darkly)
  • No Skin
Collapse
Brand Logo
  1. Home
  2. Uncategorized
  3. I'm just reading this GNU telnetd CVE from last month.

I'm just reading this GNU telnetd CVE from last month.

Scheduled Pinned Locked Moved Uncategorized
14 Posts 9 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • Waldo JaquithW This user is from outside of this forum
    Waldo JaquithW This user is from outside of this forum
    Waldo Jaquith
    wrote last edited by
    #1

    I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

    Waldo JaquithW Hoarse e-Books2 Carl MalamudC Paul_IPv6P AkaSci 🛰️A 7 Replies Last reply
    1
    0
    • Waldo JaquithW Waldo Jaquith

      I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

      Waldo JaquithW This user is from outside of this forum
      Waldo JaquithW This user is from outside of this forum
      Waldo Jaquith
      wrote last edited by
      #2

      Don't miss this explanation of how backbone providers coordinated on this telnetd exploit in advance of the CVE release, and simply blocked port 23 traffic. https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/

      John KristoffJ 1 Reply Last reply
      0
      • Waldo JaquithW Waldo Jaquith

        I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

        Hoarse e-Books2 This user is from outside of this forum
        Hoarse e-Books2 This user is from outside of this forum
        Hoarse e-Books
        wrote last edited by
        #3

        @waldoj That seems … bad.

        1 Reply Last reply
        0
        • Waldo JaquithW Waldo Jaquith

          Don't miss this explanation of how backbone providers coordinated on this telnetd exploit in advance of the CVE release, and simply blocked port 23 traffic. https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/

          John KristoffJ This user is from outside of this forum
          John KristoffJ This user is from outside of this forum
          John Kristoff
          wrote last edited by
          #4

          @waldoj I'm not aware of any backbone provider coordination. That rarely happens for blocking anything - and probably the only time I can even recall there was such a widely coordinated port block was with Slammer over 20 years ago.

          Another viewpoint here: https://www.terracenetworks.com/blog/2026-02-11-telnet-routing

          Waldo JaquithW 1 Reply Last reply
          0
          • John KristoffJ John Kristoff

            @waldoj I'm not aware of any backbone provider coordination. That rarely happens for blocking anything - and probably the only time I can even recall there was such a widely coordinated port block was with Slammer over 20 years ago.

            Another viewpoint here: https://www.terracenetworks.com/blog/2026-02-11-telnet-routing

            Waldo JaquithW This user is from outside of this forum
            Waldo JaquithW This user is from outside of this forum
            Waldo Jaquith
            wrote last edited by
            #5

            @jtk Interesting!

            1 Reply Last reply
            0
            • Waldo JaquithW Waldo Jaquith

              I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

              Carl MalamudC This user is from outside of this forum
              Carl MalamudC This user is from outside of this forum
              Carl Malamud
              wrote last edited by
              #6

              @waldoj @joebeone omg.

              1 Reply Last reply
              0
              • Waldo JaquithW Waldo Jaquith

                I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

                Paul_IPv6P This user is from outside of this forum
                Paul_IPv6P This user is from outside of this forum
                Paul_IPv6
                wrote last edited by
                #7

                @waldoj

                my first reaction when i read this was "who uses telnet these days" but then realized that this is probably exactly why no one was fixing bugs in telnetd.

                John TimaeusJ 1 Reply Last reply
                0
                • Waldo JaquithW Waldo Jaquith

                  I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

                  AkaSci 🛰️A This user is from outside of this forum
                  AkaSci 🛰️A This user is from outside of this forum
                  AkaSci 🛰️
                  wrote last edited by
                  #8

                  @waldoj
                  I suppose most orgs don’t run telnetd on their servers.

                  Waldo JaquithW 1 Reply Last reply
                  0
                  • Waldo JaquithW Waldo Jaquith

                    I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

                    der.hansL This user is from outside of this forum
                    der.hansL This user is from outside of this forum
                    der.hans
                    wrote last edited by
                    #9

                    @waldoj *Wow*, telnetd has been a thing the last 11 years?

                    telnet client[0], sure, but telnet daemon?

                    [0] Yeah, yeah, there are other tools now, but my fingers have typed telnet before I've thought of something else or figured out how to spell netcat 🙂

                    1 Reply Last reply
                    0
                    • AkaSci 🛰️A AkaSci 🛰️

                      @waldoj
                      I suppose most orgs don’t run telnetd on their servers.

                      Waldo JaquithW This user is from outside of this forum
                      Waldo JaquithW This user is from outside of this forum
                      Waldo Jaquith
                      wrote last edited by
                      #10

                      @AkaSci Boy, I hope not

                      1 Reply Last reply
                      0
                      • Paul_IPv6P Paul_IPv6

                        @waldoj

                        my first reaction when i read this was "who uses telnet these days" but then realized that this is probably exactly why no one was fixing bugs in telnetd.

                        John TimaeusJ This user is from outside of this forum
                        John TimaeusJ This user is from outside of this forum
                        John Timaeus
                        wrote last edited by
                        #11

                        @paul_ipv6 @waldoj

                        I recently heard about a major ICS/OT gear mfg that ships all end devices with telnet open and well known default creds..."for initial configuration."

                        Paul_IPv6P 1 Reply Last reply
                        0
                        • John TimaeusJ John Timaeus

                          @paul_ipv6 @waldoj

                          I recently heard about a major ICS/OT gear mfg that ships all end devices with telnet open and well known default creds..."for initial configuration."

                          Paul_IPv6P This user is from outside of this forum
                          Paul_IPv6P This user is from outside of this forum
                          Paul_IPv6
                          wrote last edited by
                          #12

                          @johntimaeus @waldoj

                          RIPE did a document with recommendations for edge devices, including not having default passwords, requiring setting a decent password before starting to route packets, etc. in the early 1990s. sad that vendors are still shipping vulnerable boxes...

                          John TimaeusJ 1 Reply Last reply
                          0
                          • Paul_IPv6P Paul_IPv6

                            @johntimaeus @waldoj

                            RIPE did a document with recommendations for edge devices, including not having default passwords, requiring setting a decent password before starting to route packets, etc. in the early 1990s. sad that vendors are still shipping vulnerable boxes...

                            John TimaeusJ This user is from outside of this forum
                            John TimaeusJ This user is from outside of this forum
                            John Timaeus
                            wrote last edited by
                            #13

                            @paul_ipv6 @waldoj

                            Grid control devices.

                            Of course they will never be connected to the internet because segmentation works.

                            @vncresolver

                            1 Reply Last reply
                            0
                            • Waldo JaquithW Waldo Jaquith

                              I'm just reading this GNU telnetd CVE from last month. I did not realize that telnet was still a thing, but it turns out anybody could provide a username of "-f root" and, boom, they had root. The vulnerability existed for 11 years. *Wow*. https://www.cve.org/CVERecord?id=CVE-2026-24061

                              matthew greenM This user is from outside of this forum
                              matthew greenM This user is from outside of this forum
                              matthew green
                              wrote last edited by
                              #14

                              @waldoj this was a bug implemented many times across many telnet daemons. the first instance was in the 80s...

                              1 Reply Last reply
                              0
                              • R ActivityRelay shared this topic
                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              • Login

                              • Don't have an account? Register

                              • Login or register to search.
                              Powered by NodeBB Contributors
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent
                              • Tags
                              • Popular
                              • World
                              • Users
                              • Groups