Details
Network devices not protected with strong password schemes provide the opportunity for anyone to crack the password thus gaining access to the device and causing network outage or denial of service. Many default vendor passwords are well-known; hence, not removing them prior to deploying the network devices into production provides an opportunity for a malicious user to gain unauthorized access to the device.
NOTE: This check requires a manual review. Determine whether or not the device is configured with default passwords. The Nessus Pluggin ID 23938 Cisco Device Default Password may be used to assist in verification. Verification with the device’s administrator should also be pursued.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
Remove any vendor default passwords from the network devices configuration.
Supportive Information
The following resource is also helpful.
This control applies to the following type of system Cisco.
References
- CAT|I
- Rule-ID|SV-3143r4_rule
- STIG-ID|NET0240
- Vuln-ID|V-3143