TCP
Опасный
Удалённый доступ
Порт 23 (Telnet)
Узнайте о порте 23 (Telnet) - угрозы безопасности, уязвимости и применение. Найдите устройства с открытым портом 23.
Краткая информация
Номер порта
23
Протокол
TCP
Сервис
Telnet
Имя IANA
Telnet
Описание сервиса
TCP port 23 is historically associated with the Telnet protocol, a now largely obsolete protocol used for providing bidirectional interactive text-oriented communication over a network, typically between a client and a server. Telnet enables users to remotely access and control a computer or device as if they were directly connected to it. The protocol operates by establishing a TCP connection to the server on port 23. Once the connection is established, the client and server exchange data as ASCII text, including commands, responses, and user input. The Telnet protocol itself is extremely simple, lacking built-in encryption or authentication mechanisms beyond a basic username and password prompt. This simplicity made it easy to implement but also inherently insecure. The protocol uses Network Virtual Terminal (NVT) data stream which defines a standard character set and control functions to ensure compatibility between different operating systems and terminal types.
At a technical level, Telnet involves the client initiating a TCP handshake with the server on port 23. The server listens for incoming connections on this port. After the handshake, the server typically presents a login prompt. The client sends the username and password (in plain text), which the server validates. If authentication is successful, the server grants the client access to a command-line interface or other applications. The protocol then transmits all subsequent data, including commands and responses, as unencrypted text. Commands such as 'ls', 'cd', 'pwd', or application-specific commands are sent from the client to the server, and the server executes these commands and sends the output back to the client. The connection persists until either the client or server terminates it, usually by sending a specific command like 'exit' or by closing the TCP connection.
## Firewall Recommendations
Telnet should generally be blocked on firewalls, especially on public-facing interfaces. If Telnet is absolutely necessary for legacy systems or specific internal network devices, it should be restricted to a dedicated, isolated network segment with strict access control policies. Consider using SSH (Secure Shell) as a secure alternative to Telnet, as it provides encryption and strong authentication. If Telnet must be used, implement strong passwords, regularly monitor Telnet logs for suspicious activity, and consider wrapping Telnet within a VPN or other secure tunnel to encrypt the traffic. Regularly audit devices running Telnet to ensure they are properly secured and patched against known vulnerabilities. Disabling Telnet entirely is the most secure option if it is not required.
At a technical level, Telnet involves the client initiating a TCP handshake with the server on port 23. The server listens for incoming connections on this port. After the handshake, the server typically presents a login prompt. The client sends the username and password (in plain text), which the server validates. If authentication is successful, the server grants the client access to a command-line interface or other applications. The protocol then transmits all subsequent data, including commands and responses, as unencrypted text. Commands such as 'ls', 'cd', 'pwd', or application-specific commands are sent from the client to the server, and the server executes these commands and sends the output back to the client. The connection persists until either the client or server terminates it, usually by sending a specific command like 'exit' or by closing the TCP connection.
## Firewall Recommendations
Telnet should generally be blocked on firewalls, especially on public-facing interfaces. If Telnet is absolutely necessary for legacy systems or specific internal network devices, it should be restricted to a dedicated, isolated network segment with strict access control policies. Consider using SSH (Secure Shell) as a secure alternative to Telnet, as it provides encryption and strong authentication. If Telnet must be used, implement strong passwords, regularly monitor Telnet logs for suspicious activity, and consider wrapping Telnet within a VPN or other secure tunnel to encrypt the traffic. Regularly audit devices running Telnet to ensure they are properly secured and patched against known vulnerabilities. Disabling Telnet entirely is the most secure option if it is not required.
Информация о безопасности
Telnet's primary security risk stems from its lack of encryption. All data transmitted over Telnet, including usernames and passwords, is sent in plain text. This makes it extremely vulnerable to eavesdropping attacks, where an attacker can intercept network traffic and easily capture sensitive credentials. Man-in-the-middle attacks are also easily facilitated due to the lack of authentication and encryption. Attackers commonly target Telnet because it provides direct access to the command-line interface of a device, allowing them to execute arbitrary commands, modify configurations, install malware, or pivot to other systems on the network. The ease of exploitation and the high potential for compromise make Telnet a significant security liability, especially on devices with default or weak passwords.
Известные уязвимости
| CVE | Название | Критичность | Описание |
|---|---|---|---|
| CVE-2019-10100 | Telnetd Stack-based Buffer Overflow | Critical | A stack-based buffer overflow vulnerability exists in the telnetd service of multiple embedded devices, allowing a remote attacker to execute arbitrary code by sending a specially crafted string during the authentication process. |
| CVE-2017-14133 | D-Link DSL-2750U Telnet Backdoor Account | High | D-Link DSL-2750U routers have a Telnet service with a hardcoded backdoor account, allowing attackers to gain unauthorized access to the device. |
| CVE-2017-15857 | Multiple D-Link Routers Telnet Command Injection | High | Multiple D-Link routers are vulnerable to command injection via the Telnet service due to insufficient input validation, allowing attackers to execute arbitrary commands. |
| CVE-2013-0166 | OpenSSL Padding Oracle Vulnerability | Medium | While not directly a Telnet vulnerability, if Telnet is wrapped in SSL (which is rare but possible), it could be vulnerable to the OpenSSL Padding Oracle vulnerability, allowing attackers to decrypt data. |
| CVE-2000-0022 | Telnet Buffer Overflow Vulnerability | High | Generic buffer overflow in telnetd service allows remote attackers to cause a denial of service or execute arbitrary commands via a long string. |
Связанное вредоносное ПО
- Mirai botnet
- Bashlite (Gafgyt) botnet
- Qbot
- Mozi botnet
Распространённое ПО
- Telnet client (various operating systems)
- Busybox (embedded systems)
- Cisco IOS (older versions)
- HP ProCurve switches (older versions)
- Some legacy network devices
- Certain industrial control systems (legacy)
Найти устройства с этим портом
Обнаружьте все устройства с открытым портом 23 в любой стране.
Искать порт 23Найдите все устройства с открытым портом 23
ScaniteX сканирует миллионы IP-адресов для поиска устройств с определёнными открытыми портами. Идеально для исследований безопасности и аудита сети.
Начать массовое сканирование
RU
English