NET0240 - Devices exist with standard default passwords

Information

The network element must not have any default manufacturer passwords.

Network elements not protected with strong password schemes provide the opportunity for anyone to crack the password thus gaining access to the device and causing network outage or denial of service. Many default vendor passwords are well known; hence, not removing them prior to deploying the network element into production provides an opportunity for a malicious user to gain unauthorized access to the device.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
NOTE: Nessus Pluggin ID 23938 Cisco Device Default Password maybe used to assist in verification.

Solution

Remove any vendor default passwords from the network element configuration.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Perimeter_Router_L3_Switch_V8R32_STIG.zip

Item Details

References: CAT|I, Rule-ID|SV-3143r4_rule, STIG-ID|NET0240, Vuln-ID|V-3143

Plugin: Cisco

Control ID: 96517a18bf3e7708d86e284ea0665ec03c23872233ef8a1649bfc77683c9f0ba