Unencrypted Protocol Usage (FTP/Telnet)

Vulnerability Details

Severity:

High

Category:

Network

Description

The system uses unencrypted protocols such as FTP, Telnet, or HTTP for transmitting sensitive data, including credentials, making traffic susceptible to interception.

Risks

An attacker on the network could capture credentials, sensitive files, and other data transmitted in plaintext through passive network sniffing.

Remediation

Replace FTP with SFTP or SCP. Replace Telnet with SSH. Enforce HTTPS for all web communications. Disable all unencrypted protocol services and block their ports at the firewall level.