NET0240 - Network devices must not have any default manufacturer passwords.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Network devices not protected with strong password schemes provide the opportunity for anyone to crack the password thus gaining access to the device and causing network outage or denial of service. Many default vendor passwords are well-known; hence, not removing them prior to deploying the network devices into production provides an opportunity for a malicious user to gain unauthorized access to the device.

NOTE: Nessus did not perform this check as manual review is required.. Determine whether or not the device is configured with default passwords. The Nessus Pluggin ID 23938 Cisco Device Default Password may be used to assist in verification. Verification with the device's administrator should also be pursued.

Solution

Remove any vendor default passwords from the network devices configuration.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Firewall_V8R24_STIG.zip

Item Details

References: CAT|I, Rule-ID|SV-3143r4_rule, STIG-ID|NET0240, Vuln-ID|V-3143

Plugin: Cisco

Control ID: d943421750f1f747aa1196f31e4af3669879be3e1ad32e296786ee654405f827