PANW-NM-000143 - The Palo Alto Networks security platform must not use the default admin account password.

Information

To assure accountability and prevent unauthenticated access, organizational administrators must be uniquely identified and authenticated for all network management accesses to prevent potential misuse and compromise of the system.

The use of a default password for any account, especially one for administrative access, can quickly lead to a compromise of the device and subsequently, the entire enclave or system. The 'admin' account is intended solely for the initial setup of the device and must be disabled when the device is initially configured. The default password for this account must immediately be changed at the first login of an authorized administrator.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Go to Device >> Administrators
Select the admin user.
In the 'Old Password' field, enter 'admin'.
In the 'New Password' field, enter the new password.
In the 'Confirm New Password' field, enter the new password.
Select 'OK'.
Commit changes by selecting 'Commit' in the upper-right corner of the screen.
Select 'OK' when the confirmation dialog appears.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_PAN_Y24M10_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

References: 800-53|CM-6b., 800-53|IA-2, CAT|I, CCI|CCI-000366, CCI|CCI-000764, Rule-ID|SV-228676r961863_rule, STIG-ID|PANW-NM-000143, STIG-Legacy|SV-77271, STIG-Legacy|V-62781, Vuln-ID|V-228676

Plugin: Palo_Alto

Control ID: 12f0c5cb057d5e00257db9ebfd71553b84a57f610c5c9fa9781141e6613b4173