GNU: Critical GNU InetUtils Vulnerability Allows Unauthenticated Root Access Via “-f root”

GNU: Critical GNU InetUtils Vulnerability Allows Unauthenticated Root Access Via “-f root”

Critical Authentication Bypass Flaw in GNU InetUtils Exposes Systems to Root-Level Attacks

A severe remote authentication bypass vulnerability has been discovered in the telnetd server component of GNU InetUtils, allowing unauthenticated attackers to gain root access on affected systems. The flaw, reported by a security researcher on January 19, 2026, stems from improper input sanitization in the telnetd authentication mechanism.

The vulnerability occurs when telnetd passes the USER environment variable received from a remote client directly to /usr/bin/login without validation. Attackers can exploit this by crafting a malicious USER variable containing the string “-f root”, which login (1) interprets as a command to bypass authentication entirely. By sending a telnet connection with this payload via the -a or –login parameter, an unauthenticated user can gain immediate root-level access without credentials.

The flaw was introduced in a March 19, 2015 code modification and first appeared in GNU InetUtils 1.9.3 (released May 12, 2015). It remains unpatched in all subsequent versions, including the latest 2.7, affecting systems running InetUtils 1.9.3 through 2.7.

GNU maintainers have outlined three mitigation strategies:

  • Disabling telnetd (preferred due to inherent security risks).
  • Restricting access to trusted clients.
  • Upgrading to patched versions provided by Eggert & Josefsson.

The vulnerability underscores the ongoing risks of legacy protocols like telnet, which lack modern security controls. Given the potential for complete system compromise, organizations are urged to prioritize remediation either by applying patches or disabling telnetd to mitigate exposure to untrusted networks.

Source: https://cybersecuritynews.com/gnu-inetutils-vulnerability/

GNU Project cybersecurity rating report: https://www.rankiteo.com/company/gnu-project

"id": "GNU1768994674",
"linkid": "gnu-project",
"type": "Vulnerability",
"date": "3/2015",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'customers_affected': 'Organizations using GNU '
                                              'InetUtils 1.9.3 through 2.7 '
                                              'with telnetd enabled',
                        'industry': 'Open Source Software',
                        'name': 'GNU InetUtils',
                        'type': 'Software'}],
 'attack_vector': 'Remote',
 'date_detected': '2026-01-19',
 'date_publicly_disclosed': '2026-01-19',
 'description': 'A severe remote authentication bypass vulnerability has been '
                'discovered in the telnetd server component of GNU InetUtils, '
                'allowing unauthenticated attackers to gain root access on '
                'affected systems. The flaw stems from improper input '
                'sanitization in the telnetd authentication mechanism, where '
                'the USER environment variable is passed directly to '
                '/usr/bin/login without validation. Attackers can exploit this '
                'by crafting a malicious USER variable containing the string '
                "'-f root', bypassing authentication entirely and gaining "
                'immediate root-level access without credentials.',
 'impact': {'operational_impact': 'Complete system compromise (root-level '
                                  'access)',
            'systems_affected': 'Systems running GNU InetUtils 1.9.3 through '
                                '2.7 with telnetd enabled'},
 'lessons_learned': 'The vulnerability underscores the ongoing risks of legacy '
                    'protocols like telnet, which lack modern security '
                    'controls.',
 'post_incident_analysis': {'corrective_actions': ['Patch the vulnerability',
                                                   'Disable telnetd',
                                                   'Restrict access to trusted '
                                                   'clients'],
                            'root_causes': 'Improper input sanitization in '
                                           'telnetd authentication mechanism, '
                                           'introduced in a March 19, 2015 '
                                           'code modification'},
 'recommendations': ['Disable telnetd (preferred due to inherent security '
                     'risks)',
                     'Restrict access to trusted clients',
                     'Upgrade to patched versions provided by Eggert & '
                     'Josefsson'],
 'references': [{'source': 'Security Researcher Report'}],
 'response': {'containment_measures': ['Disabling telnetd',
                                       'Restricting access to trusted clients'],
              'remediation_measures': ['Upgrading to patched versions provided '
                                       'by Eggert & Josefsson']},
 'title': 'Critical Authentication Bypass Flaw in GNU InetUtils Exposes '
          'Systems to Root-Level Attacks',
 'type': 'Authentication Bypass',
 'vulnerability_exploited': 'Improper input sanitization in telnetd '
                            'authentication mechanism (CWE-20)'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.