Static credentials with passwords written into a firewall’s code. What could go wrong?

  • @horse_battery_staple
    link
    English
    1429 days ago

    That could be any user logged into the CLI. Cisco is famously a network appliance company and they make admin available over the network. Anyone who can get to the LAN/VLAN these appliances are on can exploit this. So not specifically physical access.

    • @[email protected]
      link
      fedilink
      English
      1229 days ago

      You are right:

      The second is using SSH, which is enabled by default on the management interface of the device. SSH can also be enabled on data interfaces.

      Holy fuck.

      • borari
        link
        fedilink
        English
        229 days ago

        You are right:

        You should have gone with “correct”.

        • @horse_battery_staple
          link
          English
          5
          edit-2
          29 days ago

          Is that needed or useful criticism?

          HA! I totally missed the joke. Well played.

          • @Hawke
            link
            English
            529 days ago

            I think it’s more a reference to your username than actual criticism.

            • borari
              link
              fedilink
              English
              529 days ago

              Yeah, I thought that would land better.

              • @horse_battery_staple
                link
                English
                329 days ago

                Oh GEEZ! Sorry, I had a VERY literal day at work today. Completely flew over my head.

                • borari
                  link
                  fedilink
                  English
                  224 days ago

                  It’s all good. I’ve been having some of those days for what feels like the past month or two now. Hope work chills out for you!