Nessus Plugin Cisco 1010 firewall
Nessus Plugin Cisco 1010 firewall
The best plugin for a Cisco 1010 firewall based on PCI DSS Version 4, I recommend focusing on
the following:
Backdoors
This is crucial for detecting unauthorized access and potential backdoors that could
compromise cardholder data security.
Brute force attacks
This is crucial for PCI DSS v4.0 compliance, as brute force attacks target weak or default
passwords, attempting unauthorized access to sensitive systems.
CISCO
This is the most relevant plugin for Cisco devices, including Cisco Firepower 1010.
Ensures security checks specific to Cisco networking devices.
CGI abuses
If HTTP/HTTPS management interfaces are exposed to the internet, keeping CGI
Abuses enabled might help detect web-based vulnerabilities.
If your Firepower device has custom web-based applications or uses web services for
API access, this could help identify misconfigurations.
CGI abuses: XSS
If your Firepower Management Center (FMC) or Firepower Device Manager (FDM) web
interface is accessible from untrusted networks, keeping this enabled could help detect
XSS vulnerabilities in the web-based management console.
Default Unix Accounts
Checks for default and weak credentials that attackers could exploit to gain access to the
firewall.
Cisco Firepower 1010 uses Linux-based components in Firepower Threat Defense
(FTD), and some default system accounts could be a security risk if not properly secured.
Helps detect misconfigurations related to user authentication, including default or weak
usernames and passwords.
Useful if your Firepower allows SSH or other remote administrative access.
Denial of Service
Detects vulnerabilities that could allow an attacker to overload or crash the firewall.
Cisco Firepower 1010 is a critical security appliance, and a DoS attack could cause
network disruptions by consuming CPU/memory resources.
Identifies weaknesses in services like SNMP, SSH, web management, and VPN that
might be exploited in a DoS attack.
Some past Cisco Firepower vulnerabilities have included DoS-related security flaws
(e.g., malformed packet processing leading to system crashes).
DNS
Keep DNS enabled because DNS is a critical attack vector. Attackers often target DNS
services to bypass security controls, exfiltrate data, or reroute network traffic without
triggering traditional firewall alerts.
Firewalls
General firewall security checks, which may include compliance with industry standards
like PCI DSS. Detects common firewall misconfigurations that could expose the network
to threats.
FTP
Detects FTP-related vulnerabilities, such as weak authentication, anonymous access, and
misconfigurations.
Gain a shell remotely
Identifies vulnerabilities that could allow remote command execution on the firewall.
Detects misconfigurations, exploits, or weaknesses that could let attackers gain
unauthorized shell access.
Cisco Firepower supports SSH for management, so this plugin helps ensure SSH is
secured properly.
Protects against remote code execution (RCE) vulnerabilities, which have been found in
Cisco products in the past.
Ensures that no unintended backdoors exist that could allow an attacker to execute
commands remotely.
General
Performs a variety of general security checks that may not fall under specific categories
but are still crucial for identifying security issues.
Includes basic vulnerability scanning, network misconfigurations, and security policy
checks that can apply to any network device, including Firepower.
Misc.
This category includes various security checks that do not fit into other specific plugin
families but may still detect relevant vulnerabilities. May include general network
security checks, misconfigurations, and firewall-related issues that could impact
Firepower 1010. Some Cisco-related vulnerabilities might fall under this category if they
don’t have a dedicated Cisco plugin. Ensures broad vulnerability coverage for unexpected
security issues.
Policy Compliance
Helps verify Cisco Firepower’s configuration against industry security standards such as:
ISO 27001 security guidelines, PCI-DSS (for payment security compliance), CIS
Benchmarks (Center for Internet Security), NIST (National Institute of Standards and
Technology)
Service detection
Identifies all running services on the Firepower 1010, including SSH, SNMP,
HTTP/HTTPS, VPN, and more.
Helps detect unauthorized or unexpected services that may have been enabled
accidentally or by attackers.
Provides insight into open ports and exposed services, allowing you to verify that only
necessary services are running
Settings
Performance tuning for scan speed and accuracy.
SMTP problems
Firepower is inspecting SMTP traffic (via IPS/IDS features), enabling these checks could
help identify misconfigurations or vulnerabilities in email traffic filtering.
Firepower is part of an email security gateway, it might help detect SMTP-based attack
vectors.
SNMP
Detects vulnerabilities and misconfigurations in SNMP (Simple Network Management
Protocol), which is commonly used for monitoring and managing Cisco devices.
Checks for default or weak SNMP community strings (e.g., public / private), which
attackers can exploit to gain unauthorized access.
Identifies SNMP version issues (e.g., using SNMPv1 or v2c instead of the more secure
SNMPv3).
Helps detect SNMP exposure risks, ensuring that only authorized sources can query
SNMP data.
Some Cisco Firepower appliances support SNMP monitoring, so these checks can
enhance security posture.
Web Servers
This plugin can detect vulnerabilities in HTTP/HTTPS management interfaces.
This can help identify vulnerabilities in the web services it protects.
Helps detect misconfigurations, outdated software, and potential exploits in web services
running on the network.
To be determined
Databases
Cisco Firepower is a network security appliance, not a database server. (If you are
scanning a network that includes database servers, you should enable this plugin only for
scanning those specific servers, not Firepower itself)
Reason to Disable
Cisco Firepower is a network security appliance, not a file-sharing platform.
These plugins primarily scan for vulnerabilities in P2P applications like BitTorrent,
eMule, and LimeWire, which are not related to Firepower's functionality.
If your goal is to harden the firewall, these plugins are unnecessary.
Reason to Enable
If Cisco Firepower 1010 is used to monitor or block P2P traffic, enabling these checks
could help detect unauthorized file-sharing activities.
If Firepower has P2P filtering enabled, this plugin may help identify misconfigurations in
its blocking policies.
RPC
Reason to Keep Disabled (Most Cases):
Cisco Firepower 1010 does not typically use RPC services as part of its core
functionality.
RPC vulnerabilities primarily affect servers running Windows, Linux, and Unix-based
systems that rely on RPC for remote communication.
If Firepower does not expose RPC services, these checks are unnecessary