Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Critical Unpatched GNU Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE
Critical Unpatched GNU Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE
NEWS

Critical Unpatched GNU Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE

Researchers have disclosed a critical unauthenticated remote code execution vulnerability in the GNU InetUtils telnet daemon (telnetd). CVE-2026-32746...

Dylan H.

News Desk

March 18, 2026
7 min read

Critical Flaw in GNU InetUtils Telnetd Allows Unauthenticated Root Access

Cybersecurity researchers have publicly disclosed a critical security vulnerability in the GNU InetUtils telnet daemon (telnetd) that enables unauthenticated remote attackers to execute arbitrary code with elevated privileges. Tracked as CVE-2026-32746, the vulnerability was reported by The Hacker News on March 18, 2026 and represents a significant risk for any system running the GNU telnet daemon exposed over the network.

GNU InetUtils is a collection of common networking tools — including telnet, ftp, rsh, and others — distributed with many Linux and Unix-derived systems. The telnetd server component provides a Telnet listening service on TCP port 23 and is still present in a wide range of embedded systems, industrial control systems, legacy servers, and networking equipment.

No patch is currently available. Administrators are urged to disable or firewall telnetd immediately.


Vulnerability Details

AttributeValue
CVECVE-2026-32746
SeverityCritical
Affected SoftwareGNU InetUtils telnetd
Attack VectorNetwork
Authentication RequiredNone
User InteractionNone
Privilege Level AchievedElevated (root or equivalent)
Patch AvailableNo
DisclosedMarch 18, 2026

How the Vulnerability Works

The flaw resides in the GNU InetUtils telnet daemon (telnetd), the server-side component that accepts inbound Telnet connections on port 23. The vulnerability can be triggered without authentication — before any login prompt is presented to a connecting client.

Attack Flow

1. Attacker identifies a system running telnetd on TCP port 23
2. Attacker sends a specially crafted Telnet protocol packet to the daemon
3. The malformed packet triggers a memory corruption or logic error
   in the telnetd option negotiation or initialization routines
4. The vulnerability is exploitable pre-authentication — before any
   user credentials are requested or validated
5. Successful exploitation gives the attacker code execution with the
   privileges of the telnetd process (typically root)
6. Attacker has full unauthenticated remote root access to the host

Why Pre-Auth Matters

Most network service vulnerabilities require at least a valid username or some form of authentication. CVE-2026-32746 requires nothing — an attacker can begin exploitation the moment a TCP connection is established to port 23. This eliminates authentication logging as a detection signal and allows exploitation to occur without any credential data ever being submitted.

For systems where telnetd is internet-facing, this is a trivially exploitable, unauthenticated root compromise.


Affected Systems

GNU InetUtils is distributed with or present on a wide range of systems:

System TypeExposure LevelNotes
Linux servers with telnetd enabledCriticalAny internet-exposed instance is trivially exploitable
Embedded systems and appliancesHighMany use GNU InetUtils for management access
Industrial Control Systems (ICS/SCADA)HighLegacy telnet access common; patching often constrained
Network equipmentMediumSome devices use GNU telnetd for fallback management
Legacy Unix/Linux VMsMediumOld systems may have telnetd enabled by default
Docker containers with telnetdMediumAny exposed container with the daemon running

A notable concern is industrial and embedded environments where telnetd is often the only available remote management interface and firmware updates may not be possible on a short timeline.


Why Is Telnet Still in Use?

Despite being decades old and widely acknowledged as insecure (it transmits credentials and data in plaintext), Telnet persists in several contexts:

  • Legacy infrastructure — systems that predate SSH or where SSH cannot be retrofitted
  • Industrial equipment — PLCs, HMIs, and SCADA systems with Telnet management interfaces
  • Embedded devices — routers, switches, printers, and appliances from vendors who have not adopted SSH
  • Development and testing — internal lab environments where convenience is prioritized
  • Out-of-band access — some management networks use Telnet as a fallback protocol

CVE-2026-32746 transforms the latent risk of running telnetd into an immediate, critical attack surface.


Impact Assessment

Impact AreaDescription
Internet-exposed telnetdTrivial unauthenticated root compromise — mass scanning and exploitation likely
Internal network exposureAny attacker with internal access can achieve root on systems with telnetd
ICS/OT environmentsCritical risk — telnetd common in OT environments; exploitation could disrupt operations or damage equipment
Cloud/hosting infrastructureAny VPS or cloud instance with port 23 open is directly exploitable
Credential harvestingRoot access enables credential theft from all users on the compromised host

Immediate Mitigations

No patch is currently available. The following compensating controls must be applied now.

1. Disable telnetd Immediately

This is the definitive fix. Disable the telnet daemon on all systems where it is not absolutely required.

systemd-based Linux systems:

# Stop and disable the telnet daemon
sudo systemctl stop telnetd
sudo systemctl disable telnetd
 
# If using inetd/xinetd, comment out the telnet entry
sudo nano /etc/inetd.conf      # comment out: telnet stream tcp nowait root /usr/sbin/telnetd
sudo nano /etc/xinetd.d/telnet # set: disable = yes
sudo systemctl restart inetd

Verify no telnetd process is running:

ps aux | grep telnetd
ss -tlnp | grep :23

2. Block Port 23 at the Firewall

If telnetd cannot be immediately disabled (e.g., embedded systems with no remote management alternative), block all inbound access to TCP port 23 at the network perimeter.

# Block inbound Telnet from any untrusted source
iptables -I INPUT -p tcp --dport 23 -s <TRUSTED_MGMT_CIDR> -j ACCEPT
iptables -I INPUT -p tcp --dport 23 -j DROP
 
# IPv6
ip6tables -I INPUT -p tcp --dport 23 -j DROP

3. Network Segmentation for ICS/OT Environments

For industrial environments where disabling telnetd or patching is not immediately possible:

  1. Place all systems with telnetd on isolated network segments
  2. Block all routing between the OT/ICS network and corporate IT networks
  3. Require a hardened jump server for any access to the isolated segment
  4. Log all access to the segment for anomaly detection

4. Scan Your Environment

# Identify all systems with port 23 open internally
nmap -p 23 --open <INTERNAL_SUBNET>
 
# Check for GNU telnetd banner specifically
nmap -p 23 --script telnet-ntlm-info <TARGET>

Detection Guidance

Detection SignalDescription
Unexpected processes as root spawned by telnetdPost-exploitation code execution
Network connections on port 23 from unexpected sourcesScanning or exploitation attempts
Telnet banner responses in IDS/NDR alertsConfirm telnetd is still running and exposed
New root-level accounts or SSH keysPost-exploitation persistence
Unusual outbound connections from servers with port 23 openPotential C2 communication after compromise

Given the pre-authentication nature of this flaw, no authentication event will appear in logs when exploitation occurs. Network-level detections and process monitoring are the primary signals available.


Key Takeaways

  1. CVE-2026-32746 is a pre-authentication, root-level RCE in GNU InetUtils telnetd — one of the most severe vulnerability classes possible
  2. No patch is available — organizations must apply compensating controls (disable telnetd, block port 23) immediately
  3. Mass scanning for port 23 is likely once this vulnerability becomes widely known — internet-exposed instances face near-certain compromise
  4. Industrial and embedded environments face the greatest operational risk due to limited ability to disable telnetd or apply rapid updates
  5. Telnet as a protocol should have been retired years ago — this disclosure provides a definitive business case to eliminate telnetd entirely from all non-critical legacy systems
  6. Where telnetd is absolutely required, treat those systems as maximally restricted and isolated from all other network segments until a patch is available

Sources

  • Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE — The Hacker News
  • CVE-2026-32746 — NVD
  • GNU InetUtils Project
#Vulnerability#CVE#Security Updates#RCE#Linux#Network Security

Related Articles

Oracle Pushes Emergency Fix for Critical Identity Manager RCE Flaw

Oracle has released an out-of-band security update to fix a critical unauthenticated remote code execution vulnerability in Oracle Identity Manager and...

6 min read

Veeam Patches Five Critical RCE Vulnerabilities Exposing

Veeam Software has released a critical security update for Backup & Replication, patching five remote code execution vulnerabilities with CVSS scores...

6 min read

CISA Flags Actively Exploited n8n RCE Bug as 24,700

CISA added CVE-2025-68613 — a CVSS 9.9 remote code execution flaw in n8n's workflow expression evaluator — to its Known Exploited Vulnerabilities catalog...

4 min read
Back to all News