Privileged Password Management and Privileged Session Management for Cisco Environments

The most common user name and passwords for Cisco® devices are not necessarily the defaults that come with the device. Most administrators change them. Unfortunately, in most environments they can be guessed or compromised using brute force password attacks. In addition, the second most common privilege flaw is to use the same ones across the entire infrastructure and rarely, if ever, are they changed in mass even if you have outsourced the management. This problem can lead to a variety of malicious activities including recent vulnerabilities that can replace the device’s bootstrap loader with a piece of custom malware. While this vulnerability, the possible ex-filtration of data, and other flaws in privileges can lead to a compromise, there is a rather simple and effective way to secure your Cisco infrastructure from these flaws – privileged account and password management.