Service:
Protocol:
TCPPort:
23Used for:
Remote shell access over plaintext (legacy)Why It’s Open
Before SSH, Telnet was the go-to protocol for remote shell access. Still found on network devices, legacy systems, and embedded hardware.
Common Risks
- No Encryption: All credentials and data are in plaintext.
- Default Credentials: Frequently enabled with weak or unchanged passwords.
- No Logging or Access Controls: Hard to monitor misuse.
Want to save time on reporting?
Let PentestPad generate, track, and export your reports - automatically.

Enumeration & Testing
Check if it’s open
nmap -p 23 -sV
telnetWhat to Look For
| Checkpoint | What it means |
|---|---|
| Successful login | Insecure access |
| No password required | Very high-risk misconfig |
Known Exploits
- CVE-2016-0772
*Python smtplib StartTLS Stripping Vulnerability. *In certain versions of Python’s smtplib library, the SMTP.starttls() method does not raise an exception when the server fails to respond appropriately during the STARTTLS negotiation. This behavior can be exploited by a man-in-the-middle (MITM) attacker to perform a STARTTLS stripping attack, effectively downgrading the connection from a secure TLS-encrypted channel to an unencrypted one without alerting the client.
Affected Versions: Python versions prior to 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2.
Impact: Allows attackers to intercept and potentially modify sensitive information transmitted over what is assumed to be a secureconnection.
- CVE-2015-0235
*GHOST Vulnerability in glibc. *A heap-based buffer overflow was discovered in the
__nss_hostname_digits_dots()function of the GNU C Library (glibc). This vulnerability, dubbed “GHOST,” can be triggered by applications that pass user-controlled data to thegethostbyname()orgethostbyname2()functions. Exploiting this flaw could allow remote attackers to execute arbitrary code on the affected
Affected Versions: glibc versions 2.2 through 2.17.
Impact: Potential for remote code execution, leading to full system compromise.
Mitigation
- Replace with SSH.
- Disable Telnet on all interfaces.
- Use ACLs/firewalls to restrict access.
Real-World Example
Thousands of IoT devices have been compromised via Telnet using default creds (e.g., root:admin) in botnets like Mirai.
TL;DR
- Service: Telnet (Remote Login Service)
- Default Port: 23
- Risks: Unencrypted communication, credential interception
- Mitigation: Disable Telnet, use SSH instead