Cisco today released a security advisory announcing that some of Cisco's IronPort "virtual appliance" products contain "multiple default SSH keys". To quote: Oh, good thing it's only "root". You had me worried there for a second :). Interestingly, there was a somewhat similar Cisco advisory one year ago (on CUCDM) where also a default SSH key was present, and equally led to root privileges. Searching for "default credentials" on Cisco's advisory web site shows that for the past several years, the presence of backdoor and default users continues to be a recurring issue: To Cisco's credit, they seem to have found today's SSH key problem on their own, before it was abused, so maybe this is a sign of better times to come, and evidence that after all these years, someone at Cisco has actually started to systematically audit their entire code base for the presence of default credentials. Or maybe it just was a lucky find, and the "stellar" 10 year track record of default credential security bulletins will continue for another decade? Time will tell... |
Daniel 377 Posts ISC Handler Jun 26th 2015 |
Thread locked Subscribe |
Jun 26th 2015 5 years ago |
That was the perfect headline. For a while I was keeping a list of all of the products from Cisco that were found to have hard-coded credentials. It was depressingly long and validates why you cannot rely on a vendor to provide the security you need to protect a product from abuse.
|
Anonymous |
Quote |
Jun 26th 2015 5 years ago |
Sign Up for Free or Log In to start participating in the conversation!