TFTP is an insecure protocol, used mostly for transferring configuration files between routers in a network; it's...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
insecure because it transmits data unencrypted in clear text, doesn't require authentication and is based on UDP. The first two issues are the most critical from a security perspective. If the configuration files are transmitted unencrypted, they can be intercepted, read and manipulated. If they're transmitted without authentication, anybody can access them.
So why would anybody use TFTP? TFTP sits on servers that are accessed by Cisco Systems Inc. routers for updating their configuration files. Some networks still need to run it for backwards compatibility with older network hardware. However, it should be replaced with SSH, which encrypts its traffic and requires authentication.
Again, without knowing if the internal network is protected by a DMZ, it would be hard to tell if compromising the border router would compromise the entire network. Either way, compromising any router with access to the network doesn't bode well for the security of the organization. For instance, if someone controlled access to the routers in the system, and was able to change the configuration files through manipulation of a weak TFTP server, he or she could gain access deep into the network. A denial-of-service (DoS) attack is only one possibility; an attacker could unleash a whole range of malware, including keystroke loggers to obtain account credentials.
Also, if the routers on the network were compromised, the attacker would then have the necessary access to control the servers or hosts on the network, as well. And with server access, installing a rootkit into the operating system would be no problem.
For more information:
- How can an enterprise-wide network prevent denial-of-service attacks? Learn more.
- Is it impossible to remove a rootkit? Find out in this expert response.
Dig Deeper on Web authentication and access control
Related Q&A from Joel Dubin
After a server room door has been compromised, finding a more secure solution is of utmost importance. Learn how to choose a server room door that ...continue reading
In the IAM world, what's the difference between access control and identity management. This IAM expert response explains how the two relate as well ...continue reading
When working with PeopleSoft and Unix, which single sign-on (SSO) vendors offer the most effective products? Learn how to choose an SSO product in ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.