Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.8

GNU inetutils telnetd allows local privilege escalation

CVE-2026-28372
Summary

An unprivileged local user can exploit a vulnerability in GNU inetutils telnetd to gain elevated privileges on a system. This is possible by creating a specific file in a directory that telnetd uses to authenticate users. To mitigate this risk, ensure that telnetd is not running with elevated privileges and consider disabling it if not necessary for your system.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
gnu inetutils <= 2.7 –
Original title
telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2...
Original description
telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client control over the CREDENTIALS_DIRECTORY environment variable, and requires an unprivileged local user to create a login.noauth file.
nvd CVSS3.1 7.8
Vulnerability type
CWE-829
Published: 27 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026