Use of Weak Credentials

Incomplete Class
Structure: Simple
Description

This vulnerability occurs when a system relies on weak authentication credentials—like default passwords, hard-coded keys, or easily guessable values—that an attacker can deduce, reuse, or predict without needing to perform a full brute-force attack.

Extended Description

Authentication systems are designed to force attackers into time-consuming brute-force attempts when credentials are unknown. However, when credentials are weak—whether they are static, widely reused, or generated in a predictable pattern—attackers can bypass this protection entirely, gaining unauthorized access with minimal effort. Weak credentials typically fall into three categories: hard-coded (static and unchangeable), default (common across installations but changeable), or predictable (generated using a flawed or guessable method). Even if a unique credential is intended for each deployment, a predictable generation process can still make it vulnerable to efficient guessing attacks, undermining the entire authentication mechanism.

Demonstrative Examples 1

ID : DX-153

In 2022, the OT:ICEFALL study examined products by 10 different Operational Technology (OT) vendors. The researchers reported 56 vulnerabilities and said that the products were "insecure by design" [REF-1283]. If exploited, these vulnerabilities often allowed adversaries to change how the products operated, ranging from denial of service to changing the code that the products executed. Since these products were often used in industries such as power, electrical, water, and others, there could even be safety implications.
Multiple OT products used weak credentials.
Observed Examples 15
[REF-1374]Chain: JavaScript-based cryptocurrency library can fall back to the insecure Math.random() function instead of reporting a failure (Missing Report of Error Condition), thus reducing the entropy (Insufficient Entropy in PRNG) and leading to generation of non-unique cryptographic keys for Bitcoin wallets (Use of Weak Credentials)
CVE-2022-30270Remote Terminal Unit (RTU) uses default credentials for some SSH accounts
CVE-2022-29965Distributed Control System (DCS) uses a deterministic algorithm to generate utility passwords
CVE-2022-30271Remote Terminal Unit (RTU) uses a hard-coded SSH private key that is likely to be used in typical deployments
CVE-2021-38759microcontroller board has default password, allowing admin access
CVE-2021-41192data visualization/sharing package uses default secret keys or cookie values if they are not specified in environment variables
CVE-2020-8994UART interface for AI speaker uses empty password for root shell
CVE-2020-27020password manager does not generate cryptographically strong passwords, allowing prediction of passwords using guessable details such as time of generation
CVE-2020-8632password generator for cloud application has small length value, making it easier for brute-force guessing
CVE-2020-5365network-attached storage (NAS) system has predictable default passwords for a diagnostics/support account
CVE-2020-5248IT asset management app has a default encryption key that is the same across installations
CVE-2018-3825cloud cluster management product has a default master encryption key
CVE-2012-3503Installation script has a hard-coded secret token value, allowing attackers to bypass authentication
CVE-2010-2306Intrusion Detection System (IDS) uses the same static, private SSL keys for multiple devices and installations, allowing decryption of SSL traffic
CVE-2001-0618Residential gateway uses the last 5 digits of the 'Network Name' or SSID as the default WEP key, which allows attackers to get the key by sniffing the SSID, which is sent in the clear
References 4
Researchers Out Default Passwords Packaged With ICS/SCADA Wares
Kelly Jackson Higgins
04-01-2016
ID: REF-1303
ICS Alert (ICS-ALERT-13-164-01): Medical Devices Hard-Coded Passwords
ICS-CERT
13-06-2013
ID: REF-1304
OT:ICEFALL: The legacy of "insecure by design" and its implications for certifications and risk management
Forescout Vedere Labs
20-06-2022
ID: REF-1283
Randstorm: You Can't Patch a House of Cards
Unciphered
14-11-2023
ID: REF-1374
Applicable Platforms
Languages:
Not Language-Specific : Undetermined
Technologies:
ICS/OT : UndeterminedNot Technology-Specific : Undetermined
Modes of Introduction
Requirements
Architecture and Design
Installation
Operation
Related Weaknesses
Taxonomy Mapping
  • ISA/IEC 62443
  • ISA/IEC 62443
  • ISA/IEC 62443
  • ISA/IEC 62443
  • ISA/IEC 62443
  • ISA/IEC 62443
  • ISA/IEC 62443
  • ISA/IEC 62443
  • ISA/IEC 62443
  • ISA/IEC 62443
  • ISA/IEC 62443
  • ISA/IEC 62443
  • ISA/IEC 62443
  • ISA/IEC 62443
  • ISA/IEC 62443
  • ISA/IEC 62443