NET0240 - Devices exist with standard default passwords

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The network element must not have any default manufacturer passwords.

Network elements not protected with strong password schemes provide the opportunity for anyone to crack the password thus gaining access to the device and causing network outage or denial of service. Many default vendor passwords are well known; hence, not removing them prior to deploying the network element into production provides an opportunity for a malicious user to gain unauthorized access to the device.

NOTE: Nessus did not perform this check as it requires other verification as to whether or not the device is configured.
NOTE: Nessus Plugin ID 23938 Cisco Device Default Password maybe used to assist in verification.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Remove any vendor default passwords from the network element configuration.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Infrastructure_Router_L3_Switch_V8R29_STIG.zip

Item Details

References: CAT|I, Rule-ID|SV-3143r4_rule, STIG-ID|NET0240, Vuln-ID|V-3143

Plugin: Cisco

Control ID: 602df054716b8b4dc8e459322de860e59ebc699c6e4a3f73fac8762093680586