Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Critical Telnet Server Flaw Exposes Forgotten Attack Surface
    Cybersecurity

    Critical Telnet Server Flaw Exposes Forgotten Attack Surface

    adminBy adminJanuary 29, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Critical Telnet Server Flaw Exposes Forgotten Attack Surface
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Threat actors are exploiting a critical vulnerability that affects hundreds of thousands of telnet servers, bringing an often-neglected threat vector back into the limelight.

    One Monday, the US Cybersecurity and Infrastructure Security Agency (CISA) added a critical authentication bypass flaw in the GNU InetUtils telnetd server to its Known Exploited Vulnerability (KEV) catalog. The flaw, tracked as CVE-2026-24061, has lingered in the open source program for more than a decade and, if exploited, could give attackers complete control of a device.

    “If you are tired of modern age vulnerabilities, and remember the good old times on bugtraq, I hope you will appreciate this one,” security researcher Simon Josefsson wrote in his Jan. 20 disclosure on SecList.org.

    According to Josefsson, the vulnerability was introduced in May 2015 with version 1.9.3 of InetUtils, a collection of common network utilities that inludes telnet programs for remote access. While CVE-2026-24061 was addressed with version 2.8 of InetUtils, the flaw is easy to exploit and attackers are already pouncing on it.

    Related:Trio of Critical Bugs Spotted in Delta Industrial PLCs

    “GNU Inetutils Telnetd allows remote authentication bypass via an “-f root” value for the USER environment variable,” the Centre for Cybersecurity Belgium (CCB) wrote in an advisory last week, urging users to patch immediately. “This is a simple argument injection vulnerability that enables attackers to bypass authentication controls.”

    Perhaps more concerning is the staggering number of exposed telnet servers across the globe, according to an emailed advisory from the Shadowserver Foundation. “We are ~800K telnet instances exposed globally — naturally, they should not be,” Shadowserver Foundation CEO Piotr Kijewski wrote in the advisory, adding that the foundation lacked a safe way to check for the vulnerability in exposed instances.

    IoT Devices At Risk

    Telnet is considered an obsolete network protocol that isn’t used much anymore because of its lack of security, transmitting data in plaintext between the client and server with no encryption. However, it is still used by legacy systems and Internet of Things (IoT) equipment.

    “Telnet should not be publicly exposed, but often is especially on legacy IoT devices,” Kijewski wrote.

    Despite the known risks associated with exposed telnet instances, not to mention the insecure nature of the protocol itself, Forescout Technologies charted what it called a “concerning trend” last year in its report titled “The Riskiest Connected Devices of 2025.” 

    “The use of [the Secure Shell protocol, or SSH] — which is encrypted — declined across all industries, but the use of Telnet — which is not encrypted — increased in every industry,” Forescout’s Vedere Labs wrote in the report. “The largest rise in Telnet usage occurred in government networks — growing from 2% to 10% of devices — which correlates with the rise in embedded operating systems.”

    Related:AI in OT Sparks Cascade of Complex Challenges

     

    A chart showing devices running telnet by industry

    Organizations in manufacturing, healthcare, and government sectors have the most devices using telnet. Source: Forescout Technologies

    The stats are even more distressing considering the attention that threat actors pay to telnet-related vulnerabilities and insecure IoT devices in general. Daniel dos Santos, vice president of research at Forescout, tells Dark Reading that the most common devices still using the protocol are printers, networking equipment, and VoIP devices, as well as operational technology (OT) like building automation controllers and programmable logic controllers.

    He warns that the vulnerable InetUtils telnetd component is likely used by many of the devices, but it may be a challenge for organizations to track which products are vulnerable. “Security teams reviewing their networks will have to wait for vendors to issue patches that contain the fix for the telnet server. Our past experience with this type of supply chain vulnerability shows that this can take years,” dos Santos says, citing Forescout’s “Project Memoria” research into neglected TCP/IP vulnerabilities.

    Related:Analysts Warn of Cybersecurity Risks in Humanoid Robots

    Time to Retire Telnet?

    In a post on Medium, penetration tester Shivam Bathla wrote that even though telnet is an ancient protocol, he has encountered multiple instances of exposed telnet ports in systems and vehicles during pen-test engagements, which proves the protocol is “not a thing of the past but very relevant” to today’s threat landscape.

    “And I must tell you, it blew my mind on how easy it was to exploit this vulnerability,” Bathla wrote.

    Dos Santos says that 4% of all connected devices monitored by Forescout still use telnet. That may seem like a small number, but it accounts for a significant attack surface.

    “Although this is a terrible practice, there are hundreds of thousands of devices with exposed telnet servers on the Internet,” he says. “Telnet was the 10th most attacked protocol last year according to our data, with most of the attacks relying on brute forcing, since authentication bypass or remote code execution vulnerabilities on telnet servers are not so common.”

    While upgrading to a fixed InetUtils version mitigates the threat of CVE-2026-24061, Josefsson offered simple advice for organizations. “Do not run a telnetd server at all,” he wrote in his disclosure. 

    In lieu of that, he recommended organizations restrict network access to the telnet port to trusted clients only. As a temporary workaround, users can disable the telnetd server or enforce a custom login tool that does not permit use of the “-f” parameter.

    Dos Santos urged organizations to make sure they don’t have devices or systems with exposed Telnet servers on the Internet. Additionally, high-risk devices should be segmented from the rest of the network.  

    Attack Critical exposes Flaw Forgotten Server Surface Telnet
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWhy AI makes agency-client relationships matter more than ever
    Next Article SolarWinds Patches Critical Web Help Desk Vulnerabilities
    admin
    • Website

    Related Posts

    Apple account change alerts abused to send phishing emails

    April 19, 2026

    Social media bans might steer kids into riskier corners of the internet

    April 19, 2026

    Vercel confirms breach as hackers claim to be selling stolen data

    April 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Blood Strike – FPS for all 1.003.650015 APK Download by NetEase Games

    April 20, 2026

    The Ray-Ban Meta (Gen 1) smart glasses just scored a rare 25% discount at Amazon

    April 20, 2026

    The best robot vacuum in Australia: reliable, effective, effort-free automated cleaners

    April 20, 2026

    Monitor spec sheets hide the one thing that actually decides whether a display feels premium

    April 19, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,403)
    • Privacy & Online Earning (172)
    • SEO & Digital Marketing (850)
    • Tech Tools & Mobile / Apps (1,685)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Blood Strike – FPS for all 1.003.650015 APK Download by NetEase Games

    April 20, 2026

    The Ray-Ban Meta (Gen 1) smart glasses just scored a rare 25% discount at Amazon

    April 20, 2026

    The best robot vacuum in Australia: reliable, effective, effort-free automated cleaners

    April 20, 2026
    Most Popular
    • Blood Strike – FPS for all 1.003.650015 APK Download by NetEase Games
    • The Ray-Ban Meta (Gen 1) smart glasses just scored a rare 25% discount at Amazon
    • The best robot vacuum in Australia: reliable, effective, effort-free automated cleaners
    • Monitor spec sheets hide the one thing that actually decides whether a display feels premium
    • Apple account change alerts abused to send phishing emails
    • Apple AirPods Pro 3 review: A masterclass in sound, a lesson in lock-in
    • Samsung Galaxy S23 Ultra versus vivo X300 Ultra
    • Here’s How Netflix Plans to Add TikTok-Style Videos to Its Mobile App
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.