Cisco IOS TFTP File Disclosure

medium Nessus Plugin ID 17342

Synopsis

The remote TFTP daemon is serving potentially sensitive content.

Description

The remote host has a TFTP server installed that is serving one or more Cisco IOS files. These files may contain passwords and other sensitive information. A remote attacker could use this information to mount further attacks.

Solution

Disable the TFTP service if it is not being used. Otherwise, restrict access to trusted sources only.

Plugin Details

Severity: Medium

ID: 17342

File Name: tftp_files_cisco_ios.nasl

Version: 1.15

Type: remote

Family: Misc.

Published: 3/16/2005

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: Services/udp/tftp

Excluded KB Items: tftp/backdoor