CVE-2026-28372 - Vulnerability Analysis
HighCVSS: 7.4Last Updated: February 27, 2026
GNU inetutils telnetd - Privilege Escalation
Published: February 27, 2026Updated: February 27, 2026PoC Available
Overview
GNU inetutils telnetd through 2.7 contains a privilege escalation caused by client control over CREDENTIALS_DIRECTORY environment variable in systemd service credentials support, letting unprivileged local users escalate privileges, exploit requires creation of login.noauth file.
Severity & Score
Severity: High
CVSS Score: 7.4
Impact
Unprivileged local users can escalate their privileges to higher levels on the system.
Mitigation
Update to a version later than 2.7 or the latest available version.
References
- http://www.openwall.com/lists/oss-security/2026/02/27/3
- https://git.hadrons.org/cgit/debian/pkgs/inetutils.git/commit/?id=3953943d8296310485f98963883a798545ab9a6c
- https://lists.gnu.org/archive/html/bug-inetutils/2026-02/msg00000.html
- https://lists.gnu.org/archive/html/bug-inetutils/2026-02/msg00012.html
- https://www.openwall.com/lists/oss-security/2026/02/24/1
Related Resources
Details
- CVE ID
- CVE-2026-28372
- Severity
- High
- CVSS Score
- 7.4
- Type
- broken_access_control
- Status
- unconfirmed
CWE
- CWE-829
CVSS Metrics
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H