telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client control over the CREDENTIALS_DIRECTORY environment variable, and requires an unprivileged local user to create a login.noauth file.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 27 Feb 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client control over the CREDENTIALS_DIRECTORY environment variable, and requires an unprivileged local user to create a login.noauth file. | |
| Weaknesses | CWE-829 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-27T05:32:11.770Z
Reserved: 2026-02-27T05:28:17.221Z
Link: CVE-2026-28372
No data.
Status : Received
Published: 2026-02-27T06:18:00.077
Modified: 2026-02-27T06:18:00.077
Link: CVE-2026-28372
No data.
OpenCVE Enrichment
No data.
Weaknesses