this post was submitted on 28 Oct 2024
136 points (100.0% liked)

Cybersecurity

5677 readers
113 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 1 year ago
MODERATORS
 

Static credentials with passwords written into a firewall's code. What could go wrong?

you are viewing a single comment's thread
view the rest of the comments
[–] jaybone@lemmy.world 6 points 2 weeks ago (2 children)

Nothing prevents you from putting this on a LAN that can be accessed from over the internet.

[–] jmcs@discuss.tchncs.de 5 points 2 weeks ago (1 children)

Even if it's not directly accessible from the internet on its own, if it's accessible from an host exposed to the internet then anyone that can compromise a single host can immediately compromise the firewall.

"It's only exposed to the outdated wordpress server" is effectively the same as being exposed to the internet.

[–] jaybone@lemmy.world 5 points 2 weeks ago

Yeah that’s my point. Even if the manufacturer actually limits the IP config on the mgmt interface to be configured as not routable over the internet, it could intentionally be on a subnet accessible by some kind of ssh jump server or bastion host. (Or in your example, maybe unintentionally via the Wordpress server.)

[–] ryannathans@aussie.zone 1 points 2 weeks ago

Nothing prevents you from making it remotely accessible with the password "password" either