This vulnerability occurs when a system, device, or application relies on pre-configured, publicly known credentials like passwords or encryption keys for access to critical functions.
Manufacturers and developers often ship products with default usernames and passwords to simplify initial setup and deployment. While convenient, this practice creates a major security risk if these defaults are not changed, as they are often documented in manuals or easily found online, providing a universal key for attackers. For developers and system administrators, the core issue is assuming defaults will be changed. Attackers exploit this by scanning for devices or software using these well-known credentials, allowing rapid, unauthorized access across many installations. To prevent this, systems must enforce credential changes on first use or require unique credentials generated during setup.
Impact: Gain Privileges or Assume Identity
Effectiveness: High
Effectiveness: High
Effectiveness: Moderate