NET0240 - Devices exist with standard default passwords.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Network devices must not have any default manufacturer passwords.

Network devices not protected with strong password schemes provide the opportunity for anyone to crack the password thus gaining access to the device and causing network outage or denial of service. Many default vendor passwords are well-known; hence, not removing them prior to deploying the network devices into production provides an opportunity for a malicious user to gain unauthorized access to the device.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Review the network devices configuration to determine if the vendor default password is active. If any vendor default passwords are used on the device, this is a finding.

NOTE: Nessus Plugin ID 23938 Cisco Device Default Password maybe used to assist in verification.

Solution

Remove any vendor default passwords from the network devices configuration.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_L2_Switch_V8R27_STIG.zip

Item Details

References: CAT|I, Rule-ID|SV-3143r4_rule, STIG-ID|NET0240, Vuln-ID|V-3143

Plugin: Cisco

Control ID: ef71844dd025ba42968b9ccdaadbb9f98bbf937fc941fdde7c6f03dcbf84c2e6