Sunday, May 18, 2025
HomeCyber Security NewsMicrosoft Telnet Server Flaw Lets Attackers Bypass Guest Login Restrictions

Microsoft Telnet Server Flaw Lets Attackers Bypass Guest Login Restrictions

Published on

SIEM as a Service

Follow Us on Google News

A newly disclosed vulnerability in Microsoft’s Telnet Server component is making headlines after researchers revealed that attackers could exploit the flaw to bypass established guest login restrictions.

Security analysts warn that the flaw could pave the way for unauthorized access and potential escalation of privileges on vulnerable Windows systems.

Vulnerability Details Exposed

The flaw centers around the way Microsoft’s built-in Telnet Server processes guest account logins.

- Advertisement - Google News

While administrators commonly disable guest login or restrict its capabilities to prevent unauthorized access, researchers at SecureNet Labs found that attackers can craft special authentication requests that trick the server into granting guest-level access, even when such access is explicitly disabled.

“This vulnerability is particularly dangerous because it bypasses a fundamental security control,” explained Priya Menon, Senior Researcher at SecureNet Labs. “Administrators assume that disabling guest login is enough, but this bug allows attackers to sidestep that control entirely.”

Telnet, while largely deprecated in favor of more secure protocols like SSH, still exists in legacy Windows environments, especially in industrial, academic, and certain enterprise settings.

Systems running affected versions of Microsoft Windows with Telnet Server enabled are at risk. If exploited, an attacker could gain unauthenticated access to affected machines, potentially viewing sensitive data or leveraging their access to launch further attacks.

The vulnerability affects the following environments:

  • Windows Server 2012, 2016, and 2019 (with Telnet Server enabled)
  • Windows 10 and 11 with optional Telnet feature installed

It is important to note that the flaw does not impact Windows systems where the Telnet Server feature is not installed or is fully disabled.

Microsoft acknowledged the vulnerability and emphasized that Telnet remains disabled by default in all supported Windows releases.

“We urge customers to avoid enabling Telnet Server and to utilize more secure protocols wherever possible,” a Microsoft spokesperson said. The company is reportedly working on a patch and is expected to release a security update in the upcoming Patch Tuesday release cycle.

Recommendations for Users and Administrators

  • Disable Telnet Server: Unless necessary, administrators should keep the Telnet service disabled.
  • Network Segmentation: Limit network access to administrative ports and legacy services.
  • Monitor Logs: Actively review system logs for suspicious authentication attempts.
  • Apply Updates Promptly: Watch for Microsoft security advisories and install patches as soon as they are available.

This latest Telnet Server flaw underscores the risks of relying on outdated protocols and services.

As businesses modernize their infrastructure, security experts advise minimizing the use of legacy components and staying vigilant against emerging threats.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...