The system uses unencrypted protocols such as FTP, Telnet, or HTTP for transmitting sensitive data, including credentials, making traffic susceptible to interception.
An attacker on the network could capture credentials, sensitive files, and other data transmitted in plaintext through passive network sniffing.
Replace FTP with SFTP or SCP. Replace Telnet with SSH. Enforce HTTPS for all web communications. Disable all unencrypted protocol services and block their ports at the firewall level.