This key exchange algorithm does not support Perfect Forward Secrecy (PFS) which is recommended, so attackers cannot decrypt the complete communication stream.
This cipher suite uses no authentication at all. Hence, it is not providing integrity.
This cipher suite uses no encryption at all. Hence, it is not providing confidentiality.