Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28372: CWE-829 Inclusion of Functionality from Untrusted Control Sphere in GNU inetutils

0
High
VulnerabilityCVE-2026-28372cvecve-2026-28372cwe-829
Published: Fri Feb 27 2026 (02/27/2026, 05:28:17 UTC)
Source: CVE Database V5
Vendor/Project: GNU
Product: inetutils

Description

CVE-2026-28372 is a high-severity local privilege escalation vulnerability in GNU inetutils telnetd through version 2. 7. It arises from improper handling of the CREDENTIALS_DIRECTORY environment variable, allowing an unprivileged local user to escalate privileges by creating a crafted login. noauth file. The issue is linked to systemd service credentials support added in util-linux login(1) version 2. 40. Exploitation requires local access and no user interaction but has a high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. Organizations using GNU inetutils telnetd in environments where local user access is possible should prioritize patching or mitigating this vulnerability. The CVSS score is 7.

AI-Powered Analysis

AILast updated: 02/27/2026, 05:55:42 UTC

Technical Analysis

CVE-2026-28372 is a vulnerability classified under CWE-829 (Inclusion of Functionality from Untrusted Control Sphere) affecting the telnetd daemon in GNU inetutils versions up to 2.7. The flaw stems from the way telnetd interacts with systemd service credentials support introduced in util-linux's login(1) implementation version 2.40. Specifically, the vulnerability involves client control over the CREDENTIALS_DIRECTORY environment variable, which can be manipulated by an unprivileged local user. By creating a specially crafted file named login.noauth within this directory, the attacker can bypass normal authentication mechanisms and escalate privileges on the affected system. This attack vector requires local access but does not require user interaction or prior privileges. The vulnerability impacts confidentiality, integrity, and availability by allowing unauthorized privilege escalation, potentially leading to full system compromise. The CVSS v3.1 base score is 7.4, reflecting high severity with attack vector local (AV:L), attack complexity high (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No patches or exploits are currently publicly available, but the vulnerability poses a significant risk to systems running GNU inetutils telnetd, especially in environments where local user access is possible.

Potential Impact

The primary impact of CVE-2026-28372 is local privilege escalation, enabling an unprivileged user to gain elevated privileges, potentially root-level access. This can lead to unauthorized access to sensitive data, modification or deletion of critical system files, and disruption of system availability. The vulnerability compromises the confidentiality, integrity, and availability of affected systems. Organizations relying on GNU inetutils telnetd for remote or local terminal access are at risk, particularly in multi-user environments such as shared servers, development workstations, or legacy systems where telnet is still in use. Exploitation could facilitate lateral movement within networks, persistence, and further exploitation of other vulnerabilities. Although no known exploits are currently reported in the wild, the existence of this vulnerability increases the attack surface for insider threats and malicious local users. The high CVSS score reflects the serious nature of the vulnerability, especially given the widespread use of GNU inetutils in various Linux distributions and embedded systems.

Mitigation Recommendations

To mitigate CVE-2026-28372, organizations should first verify if GNU inetutils telnetd version 2.7 or earlier is in use and assess the necessity of telnet services, considering disabling telnet in favor of more secure alternatives like SSH. If telnetd must be used, restrict local user access to systems running the vulnerable software to trusted personnel only. Implement strict file system permissions to prevent unprivileged users from creating or modifying files in directories related to CREDENTIALS_DIRECTORY or login.noauth. Monitor and audit local user activities for suspicious file creations or modifications in these directories. Apply any available patches or updates from GNU inetutils or util-linux projects as soon as they are released. Additionally, consider using mandatory access control (MAC) frameworks such as SELinux or AppArmor to limit the ability of local users to influence environment variables or create unauthorized files. Network segmentation and limiting telnet access to isolated environments can reduce exposure. Finally, educate system administrators and users about the risks of running legacy services like telnet and encourage migration to secure protocols.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-02-27T05:28:17.221Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a12e7632ffcdb8a2ebeaa9

Added to database: 2/27/2026, 5:41:10 AM

Last enriched: 2/27/2026, 5:55:42 AM

Last updated: 2/27/2026, 6:47:38 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses