Static credentials with passwords written into a firewall’s code. What could go wrong?

  • ryannathans
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    3
    ·
    2 months ago

    The management interface is only available with physical access

    • jaybone@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      2 months ago

      Nothing prevents you from putting this on a LAN that can be accessed from over the internet.

      • jmcs@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        5
        ·
        2 months ago

        Even if it’s not directly accessible from the internet on its own, if it’s accessible from an host exposed to the internet then anyone that can compromise a single host can immediately compromise the firewall.

        “It’s only exposed to the outdated wordpress server” is effectively the same as being exposed to the internet.

        • jaybone@lemmy.world
          link
          fedilink
          English
          arrow-up
          5
          ·
          2 months ago

          Yeah that’s my point. Even if the manufacturer actually limits the IP config on the mgmt interface to be configured as not routable over the internet, it could intentionally be on a subnet accessible by some kind of ssh jump server or bastion host. (Or in your example, maybe unintentionally via the Wordpress server.)

      • ryannathans
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 months ago

        Nothing prevents you from making it remotely accessible with the password “password” either