Static credentials with passwords written into a firewall’s code. What could go wrong?

  • @[email protected]
    link
    fedilink
    English
    146 months ago

    That could be any user logged into the CLI. Cisco is famously a network appliance company and they make admin available over the network. Anyone who can get to the LAN/VLAN these appliances are on can exploit this. So not specifically physical access.

    • @[email protected]
      link
      fedilink
      English
      126 months ago

      You are right:

      The second is using SSH, which is enabled by default on the management interface of the device. SSH can also be enabled on data interfaces.

      Holy fuck.