【資安漏洞預警】GNU Inetutils Telnetd存在高風險安全漏洞(CVE-2026-32746),請儘速確認並進行修補
[Security Vulnerability Alert] A high-risk security vulnerability (CVE-2026-32746) exists in GNU Inetutils Telnetd. Please confirm and patch it as soon as possible.

發布單位:圖資處數位服務組
日期範圍:2026/4/10 ~ 2026/10/10
 
發布單位:圖資處數位服務組
日期範圍:2026/4/10 ~ 2026/10/10
行政 行政公告
全體

轉發 國家資安資訊分享與分析中心 資安訊息警訊 NISAC-200-202604-00000001

[內容說明]
研究人員發現GNU Inetutils Telnetd存在緩衝區溢位(Buffer Overflow)漏洞(CVE-2026-32746),未經身分鑑別之遠端攻擊者可利用此漏洞執行任意程式碼,請儘速確認並進行修補。

[影響平台]
GNU Inetutils Telnetd 2.7(含)以前版本

[建議措施]
建議所有設備或系統停止使用Telnet服務,待廠商釋出修補版本後再進行更新。

[參考資料]
1. https://nvd.nist.gov/vuln/detail/CVE-2026-32746

Forwarded from National Cybersecurity Information Sharing and Analysis Center: Cybersecurity Alert NISAC-200-202604-00000001

[Content Description]
Researchers have discovered a buffer overflow vulnerability (CVE-2026-32746) in GNU Inetutils Telnetd. An unauthenticated remote attacker could exploit this vulnerability to execute arbitrary code. Please confirm and patch it as soon as possible.

[Affected Platforms]
GNU Inetutils Telnetd versions 2.7 and earlier

[Recommended Actions]
It is recommended that all devices and systems stop using the Telnet service and wait for the vendor to release a patch before updating.

[References]
1. https://nvd.nist.gov/vuln/detail/CVE-2026-32746


相關附件
system_update_alt參考資料
Top↑