Trivial File Transfer Protocol (TFTP): 69
Security Weaknesses:
No authentication or encryption, making data easy to intercept.
Susceptible to spoofing and unauthorized access.
Vulnerable to DoS attacks due to its simplicity and lack of checks.
Security Defense and Mitigation Measures:
Restrict TFTP access to trusted devices and networks.
Replace TFTP with more secure alternatives like SFTP if possible.
Use firewalls and access control lists (ACLs) to limit TFTP traffic.
Regularly monitor and log TFTP transactions.
Indicators of Compromise or Attack:
Unusual TFTP requests or data transfers in logs.
Unauthorized devices attempting to use TFTP.
High traffic spikes on port 69 (UDP).
Last updated