Operators of the A10 Networks ADC must not use the Telnet client built into the device.

From A10 Networks ADC NDM Security Technical Implementation Guide

Part of SRG-APP-000411-NDM-000330

Associated with: CCI-002890

SV-82577r1_rule Operators of the A10 Networks ADC must not use the Telnet client built into the device.

Vulnerability discussion

If unsecured protocols (lacking cryptographic mechanisms) are used for sessions, the contents of those sessions will be susceptible to manipulation, potentially allowing alteration and hijacking of maintenance sessions. Telnet is an unsecure protocol; use SSH instead. Note: This requirement does not refer to the device accepting incoming Telnet connections (server), but instead being used as an originator of Telnet requests (client). This is the exec level command "telnet".

Check content

Determine if any operators have used Telnet. Evidence of the use of Telnet will be in the audit log. The following command shows any instances of the word "telnet" in the audit log: show audit | inc telnet If the log shows the use of the Telnet command, this is a finding.

Fix text

The device has a Telnet client that is available at the privileged exec level. Do not use it; use SSH from a management workstation instead.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer