Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-1392 — Vulnerability Class 77

77 vulnerabilities classified as CWE-1392. AI Chinese analysis included.

CWE-1392 represents a critical security weakness where software relies on hardcoded, default credentials for authentication or cryptographic operations. Attackers typically exploit this vulnerability by identifying these known, static passwords or keys, often sourced from public documentation, vendor manuals, or reverse-engineered firmware. This allows unauthorized individuals to bypass access controls and gain privileged system access without needing to crack complex passwords. To mitigate this risk, developers must enforce strict credential management policies that mandate the generation of unique, strong passwords during initial deployment or first boot. Implementing mandatory password change prompts, utilizing secure key generation algorithms, and removing any hardcoded secrets from source code are essential practices. By ensuring that every instance of the software possesses distinct, unpredictable credentials, organizations significantly reduce the attack surface and prevent widespread compromise due to predictable authentication mechanisms.

MITRE CWE Description
The product uses default credentials (such as passwords or cryptographic keys) for potentially critical functionality. It is common practice for products to be designed to use default keys, passwords, or other mechanisms for authentication. The rationale is to simplify the manufacturing process or the system administrator's task of installation and deployment into an enterprise. However, if admins do not change the defaults, it is easier for attackers to bypass authentication quickly across multiple organizations.
Common Consequences (1)
AuthenticationGain Privileges or Assume Identity
Mitigations (3)
RequirementsProhibit use of default, hard-coded, or other values that do not vary for each installation of the product - especially for separate organizations.
Effectiveness: High
Architecture and DesignForce the administrator to change the credential upon installation.
Effectiveness: High
Installation, OperationThe product administrator could change the defaults upon installation or during operation.
Effectiveness: Moderate
Examples (1)
In 2022, the OT:ICEFALL study examined products by 10 different Operational Technology (OT) vendors. The researchers reported 56 vulnerabilities and said that the products were "insecure by design" [REF-1283]. If exploited, these vulnerabilities often allowed adversaries to change how the products operated, ranging from denial of service to changing the code that the products executed. Since these…
CVE IDTitleCVSSSeverityPublished
CVE-2026-42072 Nornicdb: Improper Network Binding in NornicDB Bolt Server allows unauthorized remote access — NornicDB 9.8 Critical2026-05-08
CVE-2023-27573 netbox-docker 安全漏洞 — netbox-docker 9.0 Critical2026-03-11
CVE-2026-28713 Acronis Cyber Protect和Acronis Cyber Protect Cloud Agent 安全漏洞 — Acronis Cyber Protect Cloud Agent 7.8 -2026-03-05
CVE-2026-22886 OpenMQ 安全漏洞 — Eclipse OpenMQ 9.8 Critical2026-03-03
CVE-2026-27751 SODOLA SL902-SWTGW124AS <= 200.1.20 Use of Default Credentials — SODOLA SL902-SWTGW124AS 9.8 Critical2026-02-27
CVE-2026-26341 Tattile Smart+ / Vega / Basic <= 1.181.5 Default Credentials — Smart+ 9.8 -2026-02-24
CVE-2026-26366 JUNG eNet SMART HOME server 2.2.1/2.3.1 Use of Default Credentials — eNet SMART HOME server 9.8 Critical2026-02-15
CVE-2025-54756 BrightSign Players Use of Default Credentials — BrightSign OS series 4 players 8.4 High2026-02-12
CVE-2026-1972 Edimax BR-6208AC auth_check_userpass2 default credentials — BR-6208AC 5.3 Medium2026-02-06
CVE-2026-1803 Ziroom ZHOME A0101 Dropbear SSH Service default credentials — ZHOME A0101 8.1 High2026-02-03
CVE-2025-7740 Use of default credentials vulnerability in Hitachi Energy SuprOS product — SuprOS 7.8AIHighAI2026-01-28
CVE-2025-59108 Weak Default Passwords in dormakaba access manager — Access Manager 92xx-k5 9.8AICriticalAI2026-01-26
CVE-2026-22273 Dell ECS 安全漏洞 — ObjectScale 8.8 High2026-01-23
CVE-2025-58744 Hard-Coded Default Credentials Enable Document Archive Decryption in Milner ImageDirector Capture — ImageDirector Capture 6.2AIMediumAI2026-01-20
CVE-2022-50803 JM-DATA ONU JF511-TV 1.0.67 Default Credentials Vulnerability — JF511-TV 9.8 Critical2025-12-30
CVE-2018-25147 Microhard Systems IPn4G 1.1.0 Default Credentials Authentication Bypass — Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway Default Credentials 7.5 High2025-12-24
CVE-2021-47707 COMMAX CVD-Axx DVR Weak Default Credentials Stream Disclosure — COMMAX CVD-Axx DVR 9.1AICriticalAI2025-12-09
CVE-2025-12592 Use of default login credentials in Legacy Vivotek Devices — Affected device model numbers are FD7131-VVTK,FD7131-VVTK,FD7131-VVTK,FD7141-VVTK,IP7131-VVTK,IP7133-VVTK,IP7133-VVTK,IP7133-VVTK,IP7134-VVTK,IP7135-VVTK,IP7135-VVTK,IP7135-VVTK,IP7135-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7138-VVTK,IP7142-VVTK,IP7142-VVTK,IP7151-VVTK,IP7152-VVTK,IP7153-VVTK,IP7153-VVTK,IP7154-VVTK,IP7330-VVTK,IP7330-VVTK,IP7330-VVTK,IP8131-VVTK,IP8131-VVTK,IP8131-VVTK,IP8131W-VVTK,PT7135-VVTK,PT7137-TCON,PT7137-VVTK,PT7137-VVTK,PT7137-VVTK,PT7137-VVTK,PZ7131-VVTK,PZ7131-VVTK,PZ71X1-VVTK,PZ71X1-VVTK,PZ71X2-VVTK,SD73X3-VVTK,SD73X3-VVTK,SD73X3-VVTK,TC5330-VVTK,TC5332-TCVV,TC5333-TCVV,TC5633-TCVV,TC5633-VVTK,VS7100-VVTK,VS7100-VVTK,VS7100-VVTK 9.8AICriticalAI2025-11-19
CVE-2025-12218 Weak Default Credentials — BLU-IC2 9.4 -2025-10-25
CVE-2025-12217 SNMP Default Community String (public) — BLU-IC2 9.1 -2025-10-25
CVE-2025-10678 Admin with default credentials in NetBird VPN — NetBird 9.8AICriticalAI2025-10-20
CVE-2025-11943 70mai X200 HTTP Web Server default credentials — X200 7.3 High2025-10-19
CVE-2025-34516 Ilevia EVE X1 Server 4.7.18.0.eden Use of Default Credentials — EVE X1 Server 9.8AICriticalAI2025-10-16
CVE-2025-10542 Insecure Default Admin Credentials Enable Full Administrative Access in iMonitor EAM — iMonitor EAM 8.8AIHighAI2025-09-25
CVE-2025-35042 Airship AI Acropolis default credentials — Acropolis 9.8 Critical2025-09-22
CVE-2025-55110 BMC Control-M/Agent hardcoded default keystore password — Control-M/Agent 5.5 Medium2025-09-16
CVE-2025-55051 Baicells多款产品 安全漏洞 — NOVA430e/430i, NOVA436Q, NEUTRINO430, NOVA846 10.0 Critical2025-09-09
CVE-2025-9577 TOTOLINK X2000R Administrative shadow.sample default credentials — X2000R 2.5 Low2025-08-28
CVE-2025-9576 seeedstudio ReSpeaker Administrative shadow default credentials — ReSpeaker 2.5 Low2025-08-28
CVE-2025-35114 Agiloft local privilege escalation via default credentials — Agiloft 7.5 High2025-08-26

Vulnerabilities classified as CWE-1392 represent 77 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.