That could be any user logged into the CLI. Cisco is famously a network appliance company and they make admin available over the network. Anyone who can get to the LAN/VLAN these appliances are on can exploit this. So not specifically physical access.
Even if it’s not directly accessible from the internet on its own, if it’s accessible from an host exposed to the internet then anyone that can compromise a single host can immediately compromise the firewall.
“It’s only exposed to the outdated wordpress server” is effectively the same as being exposed to the internet.
Yeah that’s my point. Even if the manufacturer actually limits the IP config on the mgmt interface to be configured as not routable over the internet, it could intentionally be on a subnet accessible by some kind of ssh jump server or bastion host. (Or in your example, maybe unintentionally via the Wordpress server.)
Where does it say that?
Right in the Security AdvisoryEdit: NVM, later it says
That could be any user logged into the CLI. Cisco is famously a network appliance company and they make admin available over the network. Anyone who can get to the LAN/VLAN these appliances are on can exploit this. So not specifically physical access.
You are right:
Holy fuck.
Yup, that’s Cisco alright
You should have gone with “correct”.
Is that needed or useful criticism?HA! I totally missed the joke. Well played.
I think it’s more a reference to your username than actual criticism.
Yeah, I thought that would land better.
Oh GEEZ! Sorry, I had a VERY literal day at work today. Completely flew over my head.
Management interface is only available locally
The management interface can 100% be put on LAN and often is.
Okay sure then you’re asking for trouble. You could also configure the word password as your password.
I agree, its not something I would do.
Doesn’t change that it happens.
The management interface is only available with physical access
Nothing prevents you from putting this on a LAN that can be accessed from over the internet.
Even if it’s not directly accessible from the internet on its own, if it’s accessible from an host exposed to the internet then anyone that can compromise a single host can immediately compromise the firewall.
“It’s only exposed to the outdated wordpress server” is effectively the same as being exposed to the internet.
Yeah that’s my point. Even if the manufacturer actually limits the IP config on the mgmt interface to be configured as not routable over the internet, it could intentionally be on a subnet accessible by some kind of ssh jump server or bastion host. (Or in your example, maybe unintentionally via the Wordpress server.)
Nothing prevents you from making it remotely accessible with the password “password” either