this post was submitted on 28 Oct 2024
134 points (100.0% liked)

Cybersecurity

5607 readers
172 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 1 year ago
MODERATORS
 

Static credentials with passwords written into a firewall's code. What could go wrong?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 7 points 3 days ago (1 children)

To be fair you need physical access

[–] [email protected] 3 points 3 days ago (1 children)
[–] [email protected] 13 points 3 days ago* (last edited 3 days ago) (2 children)

~~Right in the Security Advisory~~

allow an unauthenticated, local attacker to access an affected system using static credentials.

Edit: NVM, later it says

The second is using SSH, which is enabled by default on the management interface of the device.

[–] [email protected] 14 points 3 days ago (1 children)

That could be any user logged into the CLI. Cisco is famously a network appliance company and they make admin available over the network. Anyone who can get to the LAN/VLAN these appliances are on can exploit this. So not specifically physical access.

[–] [email protected] 12 points 3 days ago (3 children)

You are right:

The second is using SSH, which is enabled by default on the management interface of the device. SSH can also be enabled on data interfaces.

Holy fuck.

[–] [email protected] 5 points 3 days ago* (last edited 3 days ago)

Yup, that's Cisco alright

[–] [email protected] 2 points 3 days ago (1 children)

You are right:

You should have gone with “correct”.

[–] [email protected] 5 points 3 days ago* (last edited 3 days ago) (1 children)

~~Is that needed or useful criticism?~~

HA! I totally missed the joke. Well played.

[–] [email protected] 5 points 3 days ago (1 children)

I think it’s more a reference to your username than actual criticism.

[–] [email protected] 5 points 3 days ago (1 children)

Yeah, I thought that would land better.

[–] [email protected] 2 points 3 days ago

Oh GEEZ! Sorry, I had a VERY literal day at work today. Completely flew over my head.

[–] [email protected] 2 points 3 days ago (1 children)

Management interface is only available locally

[–] [email protected] 5 points 3 days ago (1 children)

The management interface can 100% be put on LAN and often is.

[–] [email protected] 1 points 3 days ago* (last edited 3 days ago) (1 children)

Okay sure then you're asking for trouble. You could also configure the word password as your password.

[–] [email protected] 1 points 3 days ago

I agree, its not something I would do.

Doesn't change that it happens.

[–] [email protected] -2 points 3 days ago (1 children)

The management interface is only available with physical access

[–] [email protected] 6 points 3 days ago (2 children)

Nothing prevents you from putting this on a LAN that can be accessed from over the internet.

[–] [email protected] 5 points 3 days ago (1 children)

Even if it's not directly accessible from the internet on its own, if it's accessible from an host exposed to the internet then anyone that can compromise a single host can immediately compromise the firewall.

"It's only exposed to the outdated wordpress server" is effectively the same as being exposed to the internet.

[–] [email protected] 5 points 3 days ago

Yeah that’s my point. Even if the manufacturer actually limits the IP config on the mgmt interface to be configured as not routable over the internet, it could intentionally be on a subnet accessible by some kind of ssh jump server or bastion host. (Or in your example, maybe unintentionally via the Wordpress server.)

[–] [email protected] 1 points 3 days ago

Nothing prevents you from making it remotely accessible with the password "password" either