Information
AOS-CX system includes a telnet server.
Telnet is considered insecure primarily because it transmits all data, including usernames and passwords, in plaintext, meaning it's not encrypted.This leaves it vulnerable to several security risks:
Eavesdropping: Anyone with access to the network traffic can intercept and read the data transmitted during a Telnet session, including sensitive information like login credentials.
Credential Sniffing: Attackers can easily capture plaintext usernames and passwords by observing Telnet traffic.
Man-in-the-Middle (MitM) Attacks: Attackers can position themselves between the client and server, intercepting, reading, and potentially modifying the data being transmitted, according to Kelvin Zero.
Session Hijacking: With intercepted credentials, attackers can hijack ongoing Telnet sessions, gaining unauthorized access to systems and data.
Lack of Authentication: Many Telnet implementations lack proper authentication mechanisms, making them vulnerable to attacks like brute-force attacks.
In summary, Telnet's fundamental design, which involves unencrypted data transmission, makes it highly insecure and unsuitable for modern remote access, especially over public networks like the internet.Instead of Telnet, it is recommended to use Secure Shell (SSH), which provides encryption for data transmission and strong authentication mechanisms, ensuring a much higher level of security for remote access.
Telnet server is included in AOS-CX system for customer convenience. Due to it's insecurity it is not recommended for general use and is disable by default.
Solution
to disable Telnet server:
switch(config)# no telnet server vrf <vrf>
All active TELNET sessions on the VRF will be terminated.
Do you want to continue (y/n)? y
switch(config)#
Impact:
Verifying Telnet server is disabled will prevent users from accessing the console using an insecure protocol