Telnet is enabled on the device-fortinet-FortiOS
Vendor: fortinet
OS: FortiOS
Description:
Indeni will check if a device has Telnet enabled. Telnet is not encrypted and is therefore a security risk.
Remediation Steps:
Disable Telnet on the device.
|
|1. Login via ssh to the Fortinet firewall and run the FortiOS command “show system interface”. The command output lists all the interfaces and if the telnet protocol is enabled.
|2. It is highly recommended to enable the secure SSH instead of Telnet protocol on the network interface associated with the physical network ports. You can achieve this with the next commands:
|config system interface
|edit <interface_str>
|set allowaccess <protocols_list e.g. ssh>
|3. To confirm the configuration, enter the command to display the network interface’s settings “show system interface <interface_str>”
|4. Detailed information and configuration guide can be found here: https://help.fortinet.com/fos60hlp/60/Content/FortiOS/fortigate-getting-started/using-the-CLI/enabling-access-to-CLI.htm
How does this work?
This script is connected remotely to the Fortigate using SSH and retrieves the current state of the telnet service with the “show system interface | grep telnet” FortiOS command.
Why is this important?
Capture whether or not Telnet is enabled on the device. Telnet sends information, including passwords, in clear text. It is highly recommeneded that it is disabled. If Indeni finds that Telnet is enabled on an interface, an alert will be triggered. More information can be found here: https://help.fortinet.com/fos60hlp/60/Content/FortiOS/fortigate-getting-started/using-the-CLI/enabling-access-to-CLI.htm
Without Indeni how would you find this?
The administrator will have to manually to login to the device and check if Telnet is enabled. It is also possible to detect if TCP port 23 is open by using a port-scanning software like nmap.
fortios-show-system-status-telnet
name: fortios-show-system-status-telnet
description: FortiGate Telnet status
type: monitoring
monitoring_interval: 59 minutes
requires:
vendor: fortinet
os.name: FortiOS
product: firewall
comments:
telnet-enabled:
why: |
Capture whether or not Telnet is enabled on the device. Telnet sends information, including passwords, in clear text. It is highly recommeneded that it is disabled. If Indeni finds that Telnet is enabled on an interface, an alert will be triggered. More information can be found here: https://help.fortinet.com/fos60hlp/60/Content/FortiOS/fortigate-getting-started/using-the-CLI/enabling-access-to-CLI.htm
how: |
This script is connected remotely to the Fortigate using SSH and retrieves the current state of the telnet service with the "show system interface | grep telnet" FortiOS command.
can-with-snmp: false
can-with-syslog: false
steps:
- run:
type: SSH
command: show system interface | grep telnet
parse:
type: AWK
file: show_system_telnet.parser.1.awk
cross_vendor_telnet_enabled
Failed to fetch the data: https://bitbucket.org/indeni/indeni-knowledge/src/master/rules/templatebased/crossvendor/cross_vendor_telnet_enabled.scala