TL;DR

['Critical vulnerability (CVE-2026-32746) in GNU InetUtils telnet daemon enables unauthenticated remote code execution with root privileges.', 'CVSS score: 9.8/10']

What happened

['A critical security flaw has been disclosed affecting the GNU InetUtils telnet daemon (telnetd).', 'The vulnerability allows an unauthenticated attacker to execute arbitrary code with elevated privileges.']

Why it matters for ops

['Failure to patch can lead to unauthorized access and system compromise.', 'Exploitation of this flaw could result in complete loss of control over affected systems.']

Mitigation

  • Disable or remove the telnet service if not needed.
  • Apply security patches as soon as they become available.

Action items

  • Review systems for any running instances of GNU InetUtils telnet daemon.
  • Update to the latest patched version immediately if vulnerable.

Detection IOCs

  • Unusual network activity related to Telnet port (23)
  • Unexpected root-level commands issued by remote IP addresses

Source link

https://thehackernews.com/2026/03/critical-telnetd-flaw-cve-2026-32746.html