#telnet

5 posts · Last used Feb 11

Back to Timeline
@privacity@social.linux.pizza · Feb 11, 2026
2026-01-14: Il giorno in cui telnet morì Il 14 gennaio 2026, il traffico #telnet globale osservato dai sensori di GreyNoise è crollato. Una riduzione sostenuta del 59%, diciotto ASN completamente silenziosi e cinque paesi completamente scomparsi dai nostri dati. Sei giorni dopo, la CVE-2026-24061 è scomparsa. La coincidenza è una delle possibili spiegazioni. https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/ @informatica
View on social.linux.pizza
0
0
0
@Schlumpf23@social.linux.pizza · Jan 31, 2026
800K Linux servers with a Telnet vulnerability. Unless you need it to talk to some legacy systems, turn Telnet off, it's 2026. https://www.youtube.com/watch?v=81fq__6a1FQ #Telnet #Vulnerability
View on social.linux.pizza
0
0
0
@wisteela@mastodonapp.uk · Jan 30, 2026
0
0
0
@stux@mstdn.social · Jan 28, 2026
Nearly 800,000 #Telnet servers exposed to remote attacks The security flaw (CVE-2026-24061) already has a proof-of-concept exploit, impacts GNU InetUtils versions 1.9.3 (released in 2015) through 2.7, and was patched in version 2.8 (released on January 20). https://www.bleepingcomputer.com/news/security/nearly-800-000-telnet-servers-exposed-to-remote-attacks/
View on mstdn.social
7
0
10
@michabbb@social.vivaldi.net · Jan 28, 2026
🚨 Critical #Telnet Authentication Bypass Vulnerability Discovered #CVE202624061 #cybersecurity #infosec #DevOps #security 🔓 #GNU Inetutils telnetd through version 2.7 allows remote authentication bypass via "-f root" USER environment variable ⚡ The exploit is shockingly simple: attackers send "-f root" as the USER value, triggering /usr/bin/login -f root which skips password authentication entirely 🧵 👇
View on social.vivaldi.net
2
0
0

You've seen all posts