← Back to 28 Days Exposed
March 10, 2026 research

Most Recently Disclosed CVE Observed

honeypot threat-intelligence T-Pot GCP CVE telnet CVE-2026-24061 GNU-InetUtils authentication-bypass CISA-KEV rapid-exploitation telnetd 28-days-exposed

CVE-2026-24061: GNU InetUtils telnetd Authentication Bypass

Deployment Period: 2026/02/01 to 2026/02/28

Honeypot: T-Pot Community Edition, Google Cloud Platform

Data Source: Elasticsearch DSL queries, Kibana Dev Tools

TLP: TLP:CLEAR


About This Report

This report is part of a hands-on project focused on building practical skills in threat data analysis and CVE research. It is one report in an ongoing series covering the February 2026 T-Pot deployment.


Summary

CVE-2026-24061 is the most recently disclosed CVE observed in this dataset. It was published on 2026/01/21, less than two weeks before this deployment began. The honeypot recorded 9 events across 4 days. The numbers are small, but the timing stood out to me. Scanners were already looking for this vulnerability before the month even started.


CVE-2026-24061: GNU InetUtils telnetd Authentication Bypass

Telnet is an old remote access protocol, largely replaced by SSH. telnetd is the server-side component that handles incoming Telnet connections. This vulnerability exists in the GNU InetUtils version of telnetd.

The flaw comes down to a missing input check. When a client connects, it can send a username as part of the connection. telnetd passes that username directly to the system’s login program without checking it first. An attacker can send -f root as the username, which tells the login program to skip the password check and log in as root. No password needed. The bug was introduced in a 2015 code change and went unnoticed for over 10 years.

Affected products: GNU InetUtils telnetd versions 1.9.3 through 2.7. Fixed in 2.7-2, patches released 2026/01/20.

Metric Value Source
CVSS v3.1 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) NVD
EPSS 75.27% Shodan CVEDB
CISA KEV Yes, added 2026/01/26 CISA
Ransomware Unknown Shodan CVEDB

Observed activity: 9 total events across 4 active days. The first hit came on 2026/02/01, 11 days after disclosure. Six of the nine events happened on that first day. The remaining 3 were spread across 2026/02/04, 2026/02/06, and 2026/02/20.

Assessment: What I found interesting here is the speed at which this flaw was found and exploited. GreyNoise documented exploitation attempts starting within 18 hours of the original disclosure. CISA added it to the KEV catalog on 2026/01/26, six days after the patch dropped. By the time my honeypot went live, scanners had already been active for nearly two weeks. The low event count makes sense too. Telnet is uncommon on modern internet-facing systems, so there are fewer targets to scan for compared to something like a web application vulnerability.

Defender note: Patch to GNU InetUtils 2.7-2 or later, or disable telnetd entirely if you are not using it. This one is worth checking on older or embedded Linux systems where Telnet may still be running and easy to overlook. CISA’s remediation deadline for federal agencies was 2026/02/16.


Data Reference

Table 1: CVE-2026-24061 Daily Event Counts

Day Date Events
01 2026/02/01 6
02 2026/02/02 0
03 2026/02/03 0
04 2026/02/04 1
05 2026/02/05 0
06 2026/02/06 1
07-19 2026/02/07 to 2026/02/19 0
20 2026/02/20 1
21-28 2026/02/21 to 2026/02/28 0
Total   9

Methodology Notes

Event counts reflect IDS alerts, not confirmed exploitation. Suricata flagged traffic that matched a known attack pattern for this CVE. The honeypot is not a real telnetd host, so none of these attempts could have succeeded. The counts show inbound probe volume only.

Days with 0 events are omitted from the main table rows but retained in the collapsed row above for completeness.


All data sourced from Elasticsearch DSL queries against T-Pot honeypot logs, 2026/02/01 through 2026/02/28. Raw query output is preserved in honeypot-threat-research/data.


References

Source URL
NVD: CVE-2026-24061 https://nvd.nist.gov/vuln/detail/CVE-2026-24061
CVE Record: CVE-2026-24061 https://www.cve.org/CVERecord?id=CVE-2026-24061
CISA KEV Catalog https://www.cisa.gov/known-exploited-vulnerabilities-catalog
oss-security: GNU InetUtils telnetd disclosure https://www.openwall.com/lists/oss-security/2026/01/20/2
GNU bug-inetutils: Patch announcement https://lists.gnu.org/archive/html/bug-inetutils/2026-01/msg00004.html
Codeberg: Fix commit (sanitize USER variable) https://codeberg.org/inetutils/inetutils/commit/fd702c02497b2f398e739e3119bed0b23dd7aa7b
Shodan CVEDB: CVE-2026-24061 https://cvedb.shodan.io/cve/CVE-2026-24061
GreyNoise Labs: 18 Hours of Unsolicited Telnet Houseguests https://www.labs.greynoise.io/grimoire/2026-01-22-f-around-and-find-out-18-hours-of-unsolicited-houseguests/
The Hacker News: Critical GNU InetUtils telnetd Flaw https://thehackernews.com/2026/01/critical-gnu-inetutils-telnetd-flaw.html
Horizon3.ai: CVE-2026-24061 Rapid Response https://horizon3.ai/attack-research/vulnerabilities/cve-2026-24061/
Ubuntu Security: CVE-2026-24061 https://ubuntu.com/security/CVE-2026-24061