BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
CIPHERThreat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Critical Telnetd RCE, Ubuntu Privilege Escalation, and AI Platform Vulnerabilities Hit Multiple Vendors

Critical Telnetd RCE, Ubuntu Privilege Escalation, and AI Platform Vulnerabilities Hit Multiple Vendors

March 18, 2026Vulnerabilities & Exploits3 min readcritical

Originally reported by The Hacker News, Ars Technica Security, Qualys, SANS ISC, MSRC Security Updates

#telnetd#ubuntu#privilege-escalation#ai-security#ransomware#ip-kvm#rce
Share

TL;DR

Security researchers disclosed critical vulnerabilities across multiple platforms this week, including a CVSS 9.8 telnetd RCE flaw and Ubuntu privilege escalation bug. Meanwhile, LeakNet ransomware adopted ClickFix social engineering tactics and AI platforms face new data exfiltration risks.

Why critical?

Multiple critical vulnerabilities disclosed including CVE-2026-32746 (CVSS 9.8) enabling unauthenticated remote code execution in telnetd, and active ransomware campaigns using novel attack vectors.

Critical Telnetd Vulnerability Enables Unauthenticated RCE

Security researchers have disclosed CVE-2026-32746, a critical vulnerability in GNU InetUtils telnet daemon carrying a CVSS score of 9.8. The flaw represents an out-of-bounds write condition in the LINEMODE processing that allows unauthenticated remote attackers to execute arbitrary code with elevated privileges via port 23. The vulnerability affects systems running telnetd services, particularly concerning given telnet's legacy deployment in enterprise and industrial environments where it may be overlooked during security assessments.

Ubuntu Desktop Privilege Escalation Through systemd Timing

Ubuntu Desktop versions 24.04 and later contain CVE-2026-3888 (CVSS 7.8), a high-severity privilege escalation vulnerability affecting default installations. The flaw exploits timing conditions in systemd cleanup processes, allowing unprivileged local attackers to escalate to full root access. This represents a significant risk for Ubuntu workstations in corporate environments where local access controls may be the primary security boundary.

AI Platform Security Gaps Enable Data Exfiltration

BeyondTrust researchers revealed multiple vulnerabilities affecting AI code execution environments, including Amazon Bedrock, LangSmith, and SGLang platforms. The research demonstrates how attackers can exploit DNS queries in sandbox environments to exfiltrate sensitive data and establish interactive shells. Amazon Bedrock's AgentCore Code Interpreter sandbox mode permits outbound DNS queries that can be weaponized for data theft, highlighting the security challenges inherent in AI development platforms.

LeakNet Ransomware Adopts ClickFix Social Engineering

The LeakNet ransomware operation has shifted tactics, now leveraging ClickFix social engineering delivered through compromised websites. This approach tricks users into manually executing malicious commands under the pretense of fixing fabricated errors. The campaign also deploys a novel Deno-based in-memory loader, representing an evolution from traditional credential-based initial access methods toward user manipulation techniques.

IP KVM Vulnerabilities Expose Critical Infrastructure

Researchers disclosed vulnerabilities affecting IP KVM devices from four manufacturers, creating significant risks for systems requiring BIOS-level remote access. These internet-exposed devices provide attackers with potential pathways to critical infrastructure and server management systems. The vulnerabilities highlight the security challenges of remote management solutions that must balance accessibility with protection.

CISA Iranian Threat Intelligence Integration

Qualys has released enhanced intelligence capabilities within its VMDR platform to address CISA's latest Cyber Vulnerability Insights Estimate (CVIE) focusing on Iranian-linked threat activity. The update provides organizations with immediate visibility into CVEs associated with Iranian threat actors, enabling rapid exposure assessment and prioritized remediation efforts based on geopolitical threat intelligence.

Microsoft Security Updates Address libarchive DoS

Microsoft published information on CVE-2026-4111, an infinite loop denial of service vulnerability in libarchive's rar5 decompression functionality. The flaw triggers through the archive_read_data() function and could impact applications using libarchive for archive processing. Additionally, CVE-2026-23241 addresses missing syscalls in audit read class functionality.

World ID Proposes Human Verification for AI Agents

World ID has announced plans to implement iris-scan backed tokens for AI agent authentication, aiming to prevent agent swarms from overwhelming online systems. The proposal addresses growing concerns about distinguishing between human and AI-generated interactions in digital environments, though implementation and adoption challenges remain significant.

Attack Path Visibility Challenges Persist

Security teams continue struggling with contextualizing the massive volumes of vulnerability data, alerts, and misconfigurations generated by modern security tools. New approaches to attack path analysis aim to help organizations understand how individual security exposures chain together to create viable routes to critical assets, though comprehensive solutions remain elusive.

Sources

  • https://thehackernews.com/2026/03/critical-telnetd-flaw-cve-2026-32746.html
  • https://thehackernews.com/2026/03/ubuntu-cve-2026-3888-bug-lets-attackers.html
  • https://thehackernews.com/2026/03/ai-flaws-in-amazon-bedrock-langsmith.html
  • https://thehackernews.com/2026/03/leaknet-ransomware-uses-clickfix-via.html
  • https://arstechnica.com/security/2026/03/researchers-disclose-vulnerabilities-in-ip-kvms-from-4-manufacturers/
  • https://blog.qualys.com/product-tech/2026/03/17/geopolitical-cyber-threats-cisa-cvie-qualys-2026
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4111
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23241
  • https://arstechnica.com/ai/2026/03/world-id-wants-you-to-put-a-cryptographically-unique-human-identity-behind-your-ai-agents/
  • https://thehackernews.com/2026/03/product-walkthrough-how-mesh-csma.html

Originally reported by The Hacker News, Ars Technica Security, Qualys, SANS ISC, MSRC Security Updates

Tags

#telnetd#ubuntu#privilege-escalation#ai-security#ransomware#ip-kvm#rce

Tracked Companies

🇺🇸Amazon

Related Intelligence

  • Critical Zero-Days Hit Chrome, Linux AppArmor Flaws Enable Root Escalation, Veeam RCE Vulnerabilities Patched

    criticalMar 13, 2026
  • Critical Chrome Zero-Day Under Active Attack, North Korean Campaigns Target KakaoTalk, Supply Chain Attacks Hit Python Repos

    criticalMar 17, 2026
  • CNCERT Warns of Security Flaws in OpenClaw AI Agent Platform

    mediumMar 15, 2026

Related Knowledge

  • CIPHER Training: Vulnerability Research Deep Dive

    offensive
  • CIPHER Web Security Deep Dive — Training Knowledge Base

    offensive
  • CIPHER Offensive Security Deep Reference

    offensive

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Meta's AI Glasses Create New Privacy Threat Vector, Android App Emerges to Detect Smart Glasses

Next Article

Credential Theft Surge, Ransomware Evolution, and AI Security Risks Shape Threat Landscape →