Default Router Password
Created 8/22/01
Impact
A remote attacker could gain access to the router, allowing
him or her to cause a denial of service, change the configuration,
install malicious firmware, or gain unauthorized access to
the internal network.
Background
Routers and other networking devices often contain administrative
interfaces to allow the network administrator to make configuration
changes or diagnose problems remotely. The Telnet, FTP,
and HTTP protocols are commonly used to
provide such interfaces. It is usually necessary to provide
a password in order to access the device.
The Problem
Some devices are shipped with known default passwords.
If these devices are installed in an operational environment
with the default passwords still in place, they provide a
remote attacker with an easy way to gain access to the device.
Once access has been gained, the attacker could create a
denial of service, make unauthorized configuration changes,
install malicious firmware, or route packets to machines
on the internal network which would otherwise be blocked
by the router.
Resolution
Change the password to something other than the default.
A recommended password would be one which is at least
eight characters long, contains both letters and numbers,
and is not based on any associated information such as
account names, user's names, or DNS names.
Where can I read more about this?
Walter Belgers' paper,
UNIX password security, is a good reference on strengthening passwords.
Although it focuses on UNIX, the password guidelines presented
in this paper are applicable to all devices.
The default password vulnerability in ZyXEL Prestige routers
was posted to Bugtraq.