ForensicsS | Private Detective & Digital Forensics Investigation Experts
  • info@forensicss.com

    Send Email

  • 11400 West Olympic Blvd, Los Angeles, CA 90064

  • Home
  • About Us
  • Services
    • Domestic Investigation
      • Los Angeles Private Eye
      • Catch Cheater
      • Infidelity Investigations
      • Asset Investigations
      • Private Detective Orange County
      • Child Custody Investigations
      • Missing Person Locates
      • Wire Fraud
      • Corporate Security Investigations
      • Surveillance Operations
      • Financial Fraud Investigations
      • Bug Sweep TSCM Investigation
      • Workers Compensation Fraud Investigation
      • Asset and Hidden Finances Investigations
    • Cyber Security
      • DIGITAL EVIDENCE AUTHENTICATION
      • Cyber Bullying Online Investigation
      • Penetration Testing Service
      • Social Media Monitoring
      • Romance Scam Investigator
      • Cyber Stalking Investigation
      • Crypto Scam Investigation
      • Cyber Security Assessment
      • Cyber Harassment Online Investigator
      • Ransomware Attack Investigation
      • Social Media Investigator
      • Extortion Investigation services
      • Background Screening
      • Insurance Fraud Detective
      • Forensic Accounting
      • Online Identity Theft
      • Online Blackmail
      • Cell Phone Forensics
      • Automotive Forensics
      • Audio Video Forensics
      • E-Discovery
      • Assets Search 
      • Computer and Cell Phone Forensics
  • Closed Cases
    • Closed Cases
    • Case Details
  • News
  • Contact
310-270-0598

Confidentiality Guaranteed

310-270-0598

Confidentiality Guaranteed

Logo

Contact Info

  • 11400 West Olympic Blvd, Los Angeles, CA 90064
  • 310-270-0598
  • info@forensicss.com

    Blog Details

      ForensicsS | Private Detective & Digital Forensics Investigation Experts > News > Uncategorized > Hackers exploit severe telnetd auth bypass flaw to get root
    Hackers exploit severe telnetd auth bypass flaw to get root
    23
    Jan
    • ForensicsS
    • 0 Comments

    Hackers exploit severe telnetd auth bypass flaw to get root

    Scam detection

    scam detection Hackers exploit critical telnetd auth bypass flaw to get root

    A coordinated marketing campaign has been noticed concentrated on a now now not too lengthy ago disclosed severe-severity vulnerability that has been fresh in the GNU InetUtils telnetd server for 11 years.

    The protection subject is tracked as CVE-2026-24061 and become once reported on January 20. It is trivial to leverage and diverse exploit examples are publicly available.

    Trojan horse persisted since 2015

    Open-offer contributor Simon Josefsson explains that the telnetd aspect of GNU InetUtils suggestions a remote-authentication bypass vulnerability triggered by unsanitized environment variable facing when spawning ‘/usr/bin/login.’

    scam detection Wiz

    The flaw occurs because telnetd passes the user-managed USER environment variable today to login(1) with out sanitization. By environment USER to -f root and connecting with the telnet -a expose, an attacker can skip authentication and end root get admission to.

    The subject impacts GNU InetUtils variations 1.9.3 (released in 2015) thru 2.7, and become once patched in model 2.8. For of us that would per chance now now not toughen to the safe release, mitigation solutions encompass disabling the telnetd carrier or blocking off TCP port 23 on all firewalls.

    GNU InetUtils is a series of classic network client and server instruments (telnet/telnetd, ftp/ftpd, rsh/rshd, ping, traceroute) maintained by the GNU Challenge, and extinct at some stage in diverse Linux distributions.

    Even supposing Telnet is an panicked, legacy aspect largely replaced by SSH, many Linux and Unix methods quiet encompass it for compatibility or in actuality expert usage needs. It is particularly prevalent in the industrial sector thanks to its simplicity and low overhead.

    On legacy and embedded devices, it goes to slither with out updates for more than a decade, explaining its presence in IoT devices, cameras, industrial sensors, and Operational Expertise (OT) networks.

    Cristian Cornea of Zerotak, a penetration testing and cybersecurity products and companies company, told BleepingComputer that severe methods are refined to replace in OT/ICS environments.

    The researcher talked about that here’s every occasionally not probably because upgrades are accompanied by reboot operations. “As a result, we still encounter systems running Telnet servers, and even if you tried to replace them with more secure protocols such as SSH, this is not feasible due to legacy systems that remain in operation.”

    Extra technical users quiet rely on telnet for some initiatives:

    scam detection telnet still lives
    telnet quiet extinct to join to ancient devices

    One other user confirmed the spend of telnet “to connect to older Cisco devices that are way past “End of Life.”  Same SSH issue.”

    Nonetheless, devices uncovered on the public web that quiet enjoy telnet active are scarce, prompting many researchers to portray the CVE-2026-24061 vulnerability as much less severe.

    Chance monitoring firm GreyNoise reports that it has detected accurate-world exploitation job leveraging CVE-2026-24061 against a limited series of weak endpoints.

    The job, logged between January 21 and 22, originated from 18 fresh attacker IPs at some stage in 60 Telnet sessions, all deemed 100% malicious, sending 1,525 packets totaling 101.6 KB.

    scam detection Observed activity
    Seen job
    Offer: GreyNoise

    The assaults abuse the Telnet IAC choice negotiation to inject ‘USER=-f ’ and grant shell get admission to with out authentication. GreyNoise says plenty of the job appears to be like automated, even supposing it neatly-known about a “human-at-keyboard” cases.

    The assaults diverse in terminal slump, kind, and X11 DISPLAY values, however in 83.3% of the cases, they targeted the ‘root’ user.

    Within the put up-exploitation phase, the attackers performed automated reconnaissance and attempted to persist SSH keys and deploy Python malware. GreyNoise reports that these attempts failed on the noticed methods as a result of missing binaries or directories.

    Whereas the exploitation job appears to be like limited in scope and success, most definitely impacted methods need to quiet be patched or hardened as per the solutions earlier than the attackers optimize their attack chains.


    scam detection Wiz

    Scam detection Secrets Security Cheat Sheet: From Sprawl to Withhold watch over

    Whether or now now not you’re going to additionally very neatly be cleansing up ancient keys or environment guardrails for AI-generated code, this manual helps your crew assemble securely from the initiate.

    Procure the cheat sheet and clutch the guesswork out of secrets management.

    Be taught Extra

    • Tags

    • cybercrime email-fraud exploit forensics|digital-forensics hackers Investigation malware online-scam private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker

    Recent Posts

    • Trump’s FBI says ‘Epstein’ penal advanced postcard to pedophile Larry Nassar is FAKE
    • Epstein’s brother’s wild converse that Trump authorized his homicide is unearthed in DOJ files
    • Informant steered FBI that Jeffrey Epstein had a ‘non-public hacker’
    • Fireblocks CEO says North Korea-linked job recruitment scam centered LinkedIn profiles
    • How Criminal Millions Sprinted Via Binance, OKX, and Thoroughly different High Crypto Exchanges

    Recent Comments

    No comments to show.

    Categories

    • cybersecurity
    • Investigations
    • Uncategorized

    Recent Posts

    Trump’s FBI says ‘Epstein’ penal advanced postcard to pedophile Larry Nassar is FAKE
    January 30, 2026
    Trump’s FBI says ‘Epstein’ penal advanced postcard to pedophile Larry Nassar is FAKE
    Epstein’s brother’s wild converse that Trump authorized his homicide is unearthed in DOJ files
    January 30, 2026
    Epstein’s brother’s wild converse that Trump authorized his homicide is unearthed in DOJ files
    Informant steered FBI that Jeffrey Epstein had a ‘non-public hacker’
    January 30, 2026
    Informant steered FBI that Jeffrey Epstein had a ‘non-public hacker’

    Popular Tags

    administration calls Confirms Crypto Cyber cybercrime cybercrimefraud cybercrimehacker cybercrimephishing-attack cybersecurity Department digital-forensics email-fraud Epstein forensics|digital-forensics Former fraud hacker hackers Investigation investigationfraud Justice Korean Launches malware malwarefraud malwarephishing-attack Microsoft Million Minnesota North online-scam online-scamphishing-attack orders Patel phishing-attack Police private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker probe Trump warns

    Forensics – Trusted Experts in Surveillance, Cyber Security, Background Checks, and Digital Forensics across California.

    • 310-270-0598
    • info@forensicss.com
    • 11400 West Olympic Blvd, Los Angeles, CA 90064

    Explore

    • News
    • About
    • Our Services
    • Find A Person
    • Child Custody
    • Contact Us
    • Los Angeles
    • Orange County
    • San Diego

    Services

    • Cyber Security
    • Online Blackmail
    • Cell Phone Forensics
    • Domestic Investigation
    • Social Media Investigator
    • Crypto Scam Investigation

    Newsletter

    Sign up email to get our daily latest news & updates from us

    © Copyright 2021 by KRIGO