logo

Database

Description

The system transmits information through a channel without encryption.

Impact

Capture confidential information and credentials in plain text.

Recommendation

Deploy the application over an encrypted communication channel, for instance, HTTPS with TLS.

Threat

Anonymous attacker on adjacent network performing a man-in-the-middle.

Expected Remediation Time

⏱️ 15 minutes.