|
|
Message-ID: <ae76aeaf-88e5-459d-95ca-fcab8de948e2@ehuk.net> Date: Tue, 24 Feb 2026 23:18:39 +0000 From: Eddie Chapman <eddie@...k.net> To: oss-security@...ts.openwall.com, Solar Designer <solar@...nwall.com>, kf503bla@...k.com Cc: "bug-inetutils@....org" <bug-inetutils@....org>, "ron.benyizhak@...ebreach.com" <ron.benyizhak@...ebreach.com>, "simon@...efsson.org" <simon@...efsson.org>, "auerswal@...x-ag.uni-kl.de" <auerswal@...x-ag.uni-kl.de>, "justin.swartz@...ingedge.co.za" <justin.swartz@...ingedge.co.za> Subject: Re: Telnetd Vulnerability Report On 24/02/2026 20:33, Solar Designer wrote: > On Tue, Feb 24, 2026 at 05:05:58AM -0500, kf503bla@...k.com wrote: >> Who uses telnet anyway? It's deprecated. Everyone uses ssh for any kind of remote access. > > Indeed. Yet: > > Quite many people surely do still use a telnet client to access various > older/smaller devices Yes. I would hazard a guess that the largest cohort of devices running a telnet server are enterprise switches, gateways & routers. So many times over the years I've been surprised to find a switch I'm configuring has a telnet as well as the obligatory http(s) server available for the admin to login via. Albeit to a lesser extent these days, and more likely BusyBox telnetd than InetUtils. But switches are one of the most likely pieces of kit to be forgotten about and left running for 10+ years in a closet without a firmware update. There are a LOT of old switches running out there.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.