800,000 Telnet Servers Vulnerable to Remote Attacks

800,000 Telnet Servers Vulnerable to Remote Attacks

Nearly 800,000 Telnet servers are currently vulnerable to remote attacks, according to the internet security organization Shadowserver. This alarming statistic points to a significant weakness in network security stemming from a flaw in the GNU InetUtils telnetd server.

Overview of the Vulnerability

The critical vulnerability, identified as CVE-2026-24061, allows attackers to bypass authentication processes. This issue affects GNU InetUtils versions 1.9.3 to 2.7, which have been in circulation since 2015. The flaw was patched in version 2.8, released on January 20, providing users with an essential update to secure their servers.

Nature of the Exploit

Simon Josefsson, an open-source contributor, elaborated on the vulnerability. The telnetd server runs the login program as root, using the USER environment variable from the client. If a crafted USER value, such as “-f root,” is supplied, attackers can gain root access without standard authentication.

Global Impact and Distribution

Shadowserver’s tracking data reveals that over 800,000 exposed Telnet instances are spread across the globe:

  • Asia: 380,000 instances
  • South America: 170,000 instances
  • Europe: 100,000 instances

Despite this wide exposure, there is no current data indicating how many of these devices have been secured against the CVE-2026-24061 vulnerability. Piotr Kijewski, CEO of Shadowserver, emphasized the urgency of addressing these security weaknesses, particularly as many devices, especially legacy IoT products, often remain unupdated.

Recent Exploits

Following the disclosure of CVE-2026-24061, cybersecurity firm GreyNoise reported limited attacks exploiting this vulnerability. The malicious activities began on January 21, just one day after the patch was released. Attackers utilized 18 different IP addresses to conduct 60 Telnet sessions.

Attack Methods and Effects

These attacks primarily targeted the ‘root’ user, accounting for 83.3% of attempts. Although many actions appeared to be automated, some instances involved manual intervention. Attackers subsequently attempted to deploy Python malware after gaining access but faced setbacks due to missing files and directories.

Recommended Security Measures

For administrators unable to upgrade their systems immediately, it is crucial to disable the vulnerable telnetd service or close TCP port 23 on firewalls. These proactive measures can help mitigate potential risks until software updates can be implemented.

As the use of Telnet on legacy and embedded devices persists, addressing vulnerabilities like CVE-2026-24061 is essential for maintaining robust internet security. Continuous vigilance and prompt action can significantly decrease the likelihood of being targeted by attackers exploiting these weaknesses.