This vulnerability occurs when a system uses a pre-configured, publicly known cryptographic key for security-critical operations instead of generating a unique one.
Developers and manufacturers sometimes embed default cryptographic keys to simplify initial setup, manufacturing, or deployment. While convenient, this practice creates a severe security flaw if these keys are never changed, as they become a universal 'master key' known to attackers. Attackers can exploit this by using the publicly available default key to bypass authentication, decrypt sensitive data, or forge communications across every system that hasn't been properly configured. To prevent this, systems must be designed to require unique, strong keys generated during installation or first use, and administrators must be clearly prompted to change any defaults.
Impact: Gain Privileges or Assume Identity
Effectiveness: High
Effectiveness: High
Effectiveness: Moderate