TL;DR
['Critical vulnerability (CVE-2026-32746) in GNU InetUtils telnet daemon enables unauthenticated remote code execution with root privileges.', 'CVSS score: 9.8/10']
What happened
['A critical security flaw has been disclosed affecting the GNU InetUtils telnet daemon (telnetd).', 'The vulnerability allows an unauthenticated attacker to execute arbitrary code with elevated privileges.']
Why it matters for ops
['Failure to patch can lead to unauthorized access and system compromise.', 'Exploitation of this flaw could result in complete loss of control over affected systems.']
Mitigation
- Disable or remove the telnet service if not needed.
- Apply security patches as soon as they become available.
Action items
- Review systems for any running instances of GNU InetUtils telnet daemon.
- Update to the latest patched version immediately if vulnerable.
Detection IOCs
- Unusual network activity related to Telnet port (23)
- Unexpected root-level commands issued by remote IP addresses
Source link
https://thehackernews.com/2026/03/critical-telnetd-flaw-cve-2026-32746.html