Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-1392:Use of Default Credentials
Weakness ID:1392
Version:v4.17
Weakness Name:Use of Default Credentials
Vulnerability Mapping:Allowed
Abstraction:Base
Structure:Simple
Status:Incomplete
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Description

The product uses default credentials (such as passwords or cryptographic keys) for potentially critical functionality.

▼Extended Description

It is common practice for products to be designed to use default keys, passwords, or other mechanisms for authentication. The rationale is to simplify the manufacturing process or the system administrator's task of installation and deployment into an enterprise. However, if admins do not change the defaults, it is easier for attackers to bypass authentication quickly across multiple organizations.

▼Alternate Terms
▼Relationships
Relevant to the view"Research Concepts - (1000)"
NatureMappingTypeIDName
ChildOfAllowed-with-ReviewC1391Use of Weak Credentials
ParentOfAllowedB1393Use of Default Password
ParentOfAllowedB1394Use of Default Cryptographic Key
Nature: ChildOf
Mapping: Allowed-with-Review
Type: Class
ID: 1391
Name: Use of Weak Credentials
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 1393
Name: Use of Default Password
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 1394
Name: Use of Default Cryptographic Key
▼Memberships
NatureMappingTypeIDName
MemberOfProhibitedC255Credentials Management Errors
MemberOfProhibitedC1396Comprehensive Categorization: Access Control
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 255
Name: Credentials Management Errors
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1396
Name: Comprehensive Categorization: Access Control
▼Tags
NatureMappingTypeIDName
MemberOfProhibitedBSBOSS-294Not Language-Specific Weaknesses
MemberOfProhibitedBSBOSS-298Not OS-Specific(os class) Weaknesses
MemberOfProhibitedBSBOSS-301Not Architecture-Specific (architecture class) Weaknesses
MemberOfProhibitedBSBOSS-305ICS/OT (technology class) Weaknesses
MemberOfProhibitedBSBOSS-307Not Technology-Specific (technology class) Weaknesses
MemberOfProhibitedBSBOSS-332Gain Privileges or Assume Identity (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-294
Name: Not Language-Specific Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-298
Name: Not OS-Specific(os class) Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-301
Name: Not Architecture-Specific (architecture class) Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-305
Name: ICS/OT (technology class) Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-307
Name: Not Technology-Specific (technology class) Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-332
Name: Gain Privileges or Assume Identity (impact)
▼Relevant To View
Relevant to the view"Software Development - (699)"
NatureMappingTypeIDName
MemberOfProhibitedC255Credentials Management Errors
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 255
Name: Credentials Management Errors
▼Background Detail

▼Common Consequences
ScopeLikelihoodImpactNote
AuthenticationN/AGain Privileges or Assume Identity
N/A
Scope: Authentication
Likelihood: N/A
Impact: Gain Privileges or Assume Identity
Note:
N/A
▼Potential Mitigations
Phase:Architecture and Design
Mitigation ID:
Strategy:
Effectiveness: High
Description:

Force the administrator to change the credential upon installation.

Note:


Phase:Installation, Operation
Mitigation ID:
Strategy:
Effectiveness: Moderate
Description:

The product administrator could change the defaults upon installation or during operation.

Note:


Phase:Requirements
Mitigation ID:
Strategy:
Effectiveness: High
Description:

Prohibit use of default, hard-coded, or other values that do not vary for each installation of the product - especially for separate organizations.

Note:

▼Modes Of Introduction
Phase: Architecture and Design
Note:

N/A

▼Applicable Platforms
Languages
Class: Not Language-Specific(Undetermined Prevalence)
Technology
Class: ICS/OT(Undetermined Prevalence)
Class: Not Technology-Specific(Undetermined Prevalence)
Operating System
Class: Not OS-Specific(Undetermined Prevalence)
Architecture
Class: Not Architecture-Specific(Undetermined Prevalence)
▼Demonstrative Examples
Example 1

In 2022, the OT:ICEFALL study examined products by 10 different Operational Technology (OT) vendors. The researchers reported 56 vulnerabilities and said that the products were "insecure by design" [REF-1283]. If exploited, these vulnerabilities often allowed adversaries to change how the products operated, ranging from denial of service to changing the code that the products executed. Since these products were often used in industries such as power, electrical, water, and others, there could even be safety implications.

Language: ( code)
N/A

Language: ( code)
N/A

At least one OT product used default credentials.

▼Observed Examples
ReferenceDescription
CVE-2022-30270
Remote Terminal Unit (RTU) uses default credentials for some SSH accounts
CVE-2021-41192
data visualization/sharing package uses default secret keys or cookie values if they are not specified in environment variables
CVE-2021-38759
microcontroller board has default password
CVE-2018-3825
cloud cluster management product has a default master encryption key
CVE-2010-2306
Intrusion Detection System (IDS) uses the same static, private SSL keys for multiple devices and installations, allowing decryption of SSL traffic
Reference: CVE-2022-30270
Description:
Remote Terminal Unit (RTU) uses default credentials for some SSH accounts
Reference: CVE-2021-41192
Description:
data visualization/sharing package uses default secret keys or cookie values if they are not specified in environment variables
Reference: CVE-2021-38759
Description:
microcontroller board has default password
Reference: CVE-2018-3825
Description:
cloud cluster management product has a default master encryption key
Reference: CVE-2010-2306
Description:
Intrusion Detection System (IDS) uses the same static, private SSL keys for multiple devices and installations, allowing decryption of SSL traffic
▼Affected Resources
    ▼Functional Areas
      ▼Weakness Ordinalities
      OrdinalityDescription
      ▼Detection Methods
      ▼Vulnerability Mapping Notes
      Usage:Allowed
      Reason:Acceptable-Use
      Rationale:

      This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.

      Comments:

      Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.

      Suggestions:
      ▼Notes
      ▼Taxonomy Mappings
      Taxonomy NameEntry IDFitEntry Name
      ▼Related Attack Patterns
      IDName
      ▼References
      Reference ID: REF-1283
      Title: OT:ICEFALL: The legacy of "insecure by design" and its implications for certifications and risk management
      Author: Forescout Vedere Labs
      Section:
      Publication:
      Publisher:
      Edition:
      URL:https://www.forescout.com/resources/ot-icefall-report/
      URL Date:
      Day:20
      Month:06
      Year:2022
      Details not found