Description
telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client control over the CREDENTIALS_DIRECTORY environment variable, and requires an unprivileged local user to create a login.noauth file.
Published: 2026-02-27
Score: 7.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Patch
AI Analysis

Impact

Telnetd in GNU inetutils through version 2.7 contains a flaw that allows an unprivileged local user to gain higher privileges. The vulnerability arises when the client can influence the CREDENTIALS_DIRECTORY environment variable used by the systemd service credentials support introduced in util‑linux 2.40. By creating a login.noauth file, the attacker can exploit the privilege escalation path. The weakness is identified as CWE‑829, an improper restriction of privileges. This flaw enables the attacker to obtain root or administrative privileges on the host, compromising confidentiality, integrity, and availability of system resources.

Affected Systems

The affected vendor is GNU; the product is inetutils. All releases of inetutils up to and including version 2.7 are impacted, as indicated by the phrase "through 2.7" in the advisory. No specific later versions are mentioned, implying that versions newer than 2.7 are presumed to be unaffected once the patch is applied.

Risk and Exploitability

The CVSS score of 7.4 indicates a high severity vulnerability. The EPSS score of less than 1% points to a very low probability of exploitation at this time. The vulnerability is not listed in CISA's KEV catalog. Exploitation requires a local user able to create a login.noauth file and manipulate the CREDENTIALS_DIRECTORY variable, so the attack vector is local. The risk is therefore significant for environments that run telnetd or grant local users the ability to write to the credential directory.

Generated by OpenCVE AI on April 16, 2026 at 15:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update GNU inetutils to a version that includes the telnetd fix—typically 2.8 or later if available.
  • Modify the permissions of the systemd credential directory to prevent writes by non‑privileged users and remove any unused login.noauth files.
  • Disable or restrict access to telnetd if it is not required for operations, or replace it with a more secure service such as SSH.

Generated by OpenCVE AI on April 16, 2026 at 15:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4527-1 inetutils security update
History

Thu, 16 Apr 2026 16:00:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Telnetd and Systemd Credentials

Sat, 07 Mar 2026 17:30:00 +0000


Fri, 06 Mar 2026 18:30:00 +0000


Mon, 02 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:gnu:inetutils:*:*:*:*:*:*:*:*

Fri, 27 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
References

Fri, 27 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Gnu
Gnu inetutils
Vendors & Products Gnu
Gnu inetutils
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 05:45:00 +0000

Type Values Removed Values Added
Description telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client control over the CREDENTIALS_DIRECTORY environment variable, and requires an unprivileged local user to create a login.noauth file.
Weaknesses CWE-829
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-07T17:05:13.869Z

Reserved: 2026-02-27T05:28:17.221Z

Link: CVE-2026-28372

cve-icon Vulnrichment

Updated: 2026-03-07T17:05:13.869Z

cve-icon NVD

Status : Modified

Published: 2026-02-27T06:18:00.077

Modified: 2026-03-07T17:15:51.663

Link: CVE-2026-28372

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T15:45:16Z

Weaknesses