CCE-92350-8Platform: Amazon Linux | Date: (C)2018-10-29 (M)2022-10-10 |
Disable telnet Service
The 'telnet' service configuration file '/etc/xinetd.d/telnet'
is not created automatically. If it was created manually, check the
'/etc/xinetd.d/telnet' file and ensure that 'disable = no'
is changed to read 'disable = yes' as follows below:
# description: The telnet server serves telnet sessions; it uses \\
# unencrypted username/password pairs for authentication.
service telnet
Then the activation of the 'telnet' service on system boot can be disabled
via the following command:
'# systemctl disable telnet.socket'
Parameter:
Technical Mechanism:
The telnet protocol uses unencrypted network communication, which
means that data from the login session, including passwords and
all other information transmitted during the session, can be
stolen by eavesdroppers on the network. The telnet protocol is also
subject to man-in-the-middle attacks.
Fix:
No Remediation Info
CCSS Severity: | CCSS Metrics: |
CCSS Score : | Attack Vector: |
Exploit Score: | Attack Complexity: |
Impact Score: | Privileges Required: |
Severity: | User Interaction: |
Vector: | Scope: |
| Confidentiality: |
| Integrity: |
| Availability: |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:48537 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:48537 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:48735 |