Vulnerability Details
Severity:
High
Category:
Network
Description
The system uses unencrypted protocols such as FTP, Telnet, or HTTP for transmitting sensitive data, including credentials, making traffic susceptible to interception.
Risks
An attacker on the network could capture credentials, sensitive files, and other data transmitted in plaintext through passive network sniffing.
Remediation
Replace FTP with SFTP or SCP. Replace Telnet with SSH. Enforce HTTPS for all web communications. Disable all unencrypted protocol services and block their ports at the firewall level.