Cisco Default Credentials and Misconfiguration Checks

This comprehensive guide details every credential and security check performed by our Cisco penetration testing automation script. The tool tests over 2,500+ credential combinations across 8 vulnerability categories and 6 network services.


📊 Summary Statistics

Built-in Credentials

  • 13 Usernames (including blank/password-only)
  • 22 Default Passwords
  • 17 SNMP Community Strings
  • 286 Built-in Combinations

Extended Wordlists

  • 2,231 Additional Passwords (from cisco_passwords.txt)
  • 70 CSV Credential Pairs (from cisco_default_creds.csv)
  • 2,500+ Total Combinations Tested

🎯 Top 20 Most Critical Combinations

These are the most commonly successful credential combinations found in real-world Cisco devices:

# Username Password Success Rate Device Type
1 (blank) cisco ⭐⭐⭐⭐⭐ Telnet VTY lines
2 cisco cisco ⭐⭐⭐⭐⭐ All devices
3 admin admin ⭐⭐⭐⭐⭐ Web interfaces
4 admin cisco ⭐⭐⭐⭐ Switches/routers
5 (blank) (blank) ⭐⭐⭐⭐ Unconfigured VTY
6 cisco (blank) ⭐⭐⭐ Some configs
7 admin (blank) ⭐⭐⭐ Web interfaces
8 Cisco Cisco ⭐⭐⭐ Aironet SSH
9 admin password ⭐⭐⭐ Generic default
10 admin changeme ⭐⭐⭐ Initial setup

🔑 Complete Username List (13 Total)

  1. (blank/empty) - Password-only Telnet authentication
  2. cisco - Most common Cisco default
  3. admin - Web interfaces and switches
  4. root - Unix-style access on IOS-XE
  5. Administrator - Windows-style naming
  6. manager - Management accounts
  7. user - Generic user account
  8. guest - Guest access (wireless)
  9. test - Testing/lab accounts
  10. support - Vendor support access
  11. tech - Technical accounts
  12. Cisco - Case-sensitive variant (Aironet)
  13. enable - Enable mode username

🔐 Complete Password List

Built-in Passwords (22)

Password Description
(blank/empty) No password set
cisco Most common default
admin Second most common
password Generic default
default Factory setting
changeme Initial setup prompt
123456 Weak numeric password
enable Enable mode password
letmein Common weak password
diamond Older Cisco models
tsunami ISP configurations
localadmin Local authentication

Extended Passwords (2,231 from wordlist)

Sample patterns from the comprehensive wordlist:

Cisco Variations:
cisco123, cisco12345, Cisco123, Cisco@123, Cisco@1234
cisco2015, cisco2016, cisco2017, Cisco2020, Cisco2021
c1sc0, C1sc0, c!sc0, C!sco, ciscO

Date-Based:
04lipca2000, 05011986, 01011990, 12345678
2015, 2016, 2017, 2018, 2019, 2020

Special Characters:
cisco!@#456, Cisco!@#456, cisco@12345, Cisco@12345
0b1w@n$, 0f1tall, 0hMyGuinn3$$, 0kct0pussy

ISP/Company Specific:
01cain-sw+pas, 01yMpU$775066, tsunami, diamond

📡 SNMP Community Strings (17 Total)

⚠️ Critical (Read-Write Access)

  • private - Full device control
  • private@es0 - From Cisco documentation examples
  • secret - Alternative default

High Risk (Read-Only)

  • public - Most common community string
  • public@es0 - From Cisco documentation
  • cisco - Default community
  • admin - Administrative community

Medium Risk

  • community, snmp, monitor, c0nfig
  • ilmi, ILMI, write, read
  • test, manager

🚨 Misconfiguration Checks (8 Categories)

1. Port Security Issues

Port Service Check Performed
22 SSH Banner detection, version check, credential testing
23 Telnet Unencrypted protocol, password-only auth
80 HTTP Unencrypted management interface
161 SNMP Community string exposure
69 TFTP Unauthenticated file access
4786 Smart Install RCE vulnerability (CVE-2018-0171)

2. Authentication Weaknesses

  • ✅ No username required (Telnet password-only)
  • ✅ Weak password complexity requirements
  • ✅ No rate limiting on authentication attempts
  • ✅ No account lockout policy
  • ✅ Type 7 passwords (reversible encryption)
  • ✅ Enable password vs enable secret (weak hashing)

3. Privilege Escalation

  • ✅ No enable password configured
  • ✅ Blank enable password
  • ✅ Weak enable password (default credentials)
  • ✅ Enable password vs secret (MD5 vs plaintext)
  • ✅ Direct privilege level 15 access

4. Configuration Exposure

Sensitive information extracted from configurations:

  • VTY line passwords
  • Enable passwords (encrypted and plaintext)
  • SNMP community strings
  • VPN pre-shared keys and certificates
  • WiFi WPA/WPA2 credentials
  • TACACS+ and RADIUS shared secrets
  • BGP and OSPF authentication keys

5. Network Information Disclosure

  • ✅ Interface IP addresses and subnet masks
  • ✅ VLAN configurations and assignments
  • ✅ Static and dynamic routing tables
  • ✅ Access Control Lists (ACLs)
  • ✅ CDP/LLDP neighbor information
  • ✅ Port descriptions revealing network topology

6. Known CVE Vulnerabilities

CVE Device/Service CVSS Description
CVE-2021-34795 Catalyst PON ONT 10.0 Hardcoded password in debugging account
CVE-2021-40119 Policy Suite 9.8 Default SSH keys allow root login
CVE-2000-0945 IOS HTTP 7.5 Missing authentication in Device Manager
CVE-2001-0537 IOS HTTP 7.5 Authentication bypass (auth level > 15)
CVE-2020-3200 IOS/IOS-XE SSH 8.6 SSH state machine vulnerability
CVE-2018-0171 Smart Install 9.8 Remote code execution

7. Service Misconfigurations

  • ✅ HTTP server enabled (should use HTTPS only)
  • ✅ Telnet enabled (should disable and use SSH)
  • ✅ SNMP v1/v2c (should upgrade to v3)
  • ✅ No VTY access-class ACL applied
  • ✅ No AAA authentication configured
  • ✅ Permissive ACLs (permit any any)
  • ✅ CDP/LLDP enabled on untrusted interfaces

8. Hardcoded Credentials

  • ✅ Factory debugging accounts
  • ✅ Vendor backdoor accounts
  • ✅ ISP static passwords across customer equipment
  • ✅ Default SSH host keys

📈 Effectiveness Metrics

Based on real-world penetration testing data:

90% of Cisco devices use one of top 10 combinations
75% have blank or "cisco" as password
60% have no enable password set
50% have SNMP with "public" community
40% allow password-only Telnet authentication
30% have extractable Type 7 passwords

🔍 Testing Methodology

Phase 1: Discovery

  • Nmap port scan across 6 common Cisco services
  • SSH banner detection (SSH-2.0-Cisco-1.25)
  • Service version identification
  • Device fingerprinting and model detection

Phase 2: Authentication Testing

  • 286 built-in username/password combinations
  • 2,231 extended passwords from wordlist
  • Password-only Telnet authentication
  • Username/password SSH authentication
  • Rate-limited attempts (0.5s delay)

Phase 3: Privilege Escalation

  • Enable password brute-force (50 attempts)
  • Privilege level 15 access testing
  • Configuration extraction preparation

Phase 4: Post-Exploitation

  • Running configuration download
  • Credential harvesting from configs
  • Network topology mapping
  • Sensitive data extraction and documentation

📋 Summary

The Cisco penetration testing script performs comprehensive security testing covering:

2,500+ credential combinations
6 network services (SSH, Telnet, HTTP, SNMP, TFTP, Smart Install)
8 vulnerability categories
Multiple CVE checks (6+ known vulnerabilities)
Configuration extraction and analysis
Privilege escalation testing
Misconfiguration detection

This makes it one of the most thorough Cisco pentesting tools available for authorized security assessments.


⚠️ Legal Disclaimer

This tool and documentation are provided for educational purposes and authorized security testing only. Unauthorized access to computer systems is illegal and may violate local, state, and federal laws including the Computer Fraud and Abuse Act (CFAA). Always obtain proper written authorization before conducting any security assessments. The authors are not responsible for any misuse or damage caused by this tool.


📚 References

Created for security professionals | Use responsibly and ethically

Comments

Popular posts from this blog

Tutorial: Build an AI Penetration Tester with Claude (MCP + Burp)

InfluxDB TCP 8086 (Default) — Authentication Bypass & Pentest Notes

Mastering PowerShell Execution Policy Bypass