Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-1392 — Vulnerability Class 77

77 vulnerabilities classified as CWE-1392. AI Chinese analysis included.

CWE-1392 represents a critical security weakness where software relies on hardcoded, default credentials for authentication or cryptographic operations. Attackers typically exploit this vulnerability by identifying these known, static passwords or keys, often sourced from public documentation, vendor manuals, or reverse-engineered firmware. This allows unauthorized individuals to bypass access controls and gain privileged system access without needing to crack complex passwords. To mitigate this risk, developers must enforce strict credential management policies that mandate the generation of unique, strong passwords during initial deployment or first boot. Implementing mandatory password change prompts, utilizing secure key generation algorithms, and removing any hardcoded secrets from source code are essential practices. By ensuring that every instance of the software possesses distinct, unpredictable credentials, organizations significantly reduce the attack surface and prevent widespread compromise due to predictable authentication mechanisms.

MITRE CWE Description
The product uses default credentials (such as passwords or cryptographic keys) for potentially critical functionality. It is common practice for products to be designed to use default keys, passwords, or other mechanisms for authentication. The rationale is to simplify the manufacturing process or the system administrator's task of installation and deployment into an enterprise. However, if admins do not change the defaults, it is easier for attackers to bypass authentication quickly across multiple organizations.
Common Consequences (1)
AuthenticationGain Privileges or Assume Identity
Mitigations (3)
RequirementsProhibit use of default, hard-coded, or other values that do not vary for each installation of the product - especially for separate organizations.
Effectiveness: High
Architecture and DesignForce the administrator to change the credential upon installation.
Effectiveness: High
Installation, OperationThe product administrator could change the defaults upon installation or during operation.
Effectiveness: Moderate
Examples (1)
In 2022, the OT:ICEFALL study examined products by 10 different Operational Technology (OT) vendors. The researchers reported 56 vulnerabilities and said that the products were "insecure by design" [REF-1283]. If exploited, these vulnerabilities often allowed adversaries to change how the products operated, ranging from denial of service to changing the code that the products executed. Since these…
CVE IDTitleCVSSSeverityPublished
CVE-2024-7898 Tosei Online Store Management System ネット店舗管理システム Backend default credentials — Online Store Management System ネット店舗管理システム 7.3 High2024-08-17
CVE-2024-7746 Use of default credentials at Traccar fleet management solution — Server 9.8AICriticalAI2024-08-13
CVE-2024-6788 Phoenix Contact: update feature from CHARX controller can be used to reset a low privilege user password — CHARX SEC-3000 8.6 High2024-08-13
CVE-2023-40704 Philips Vue PACS Use of Default Credentials — Vue PACS 6.8 Medium2024-07-18
CVE-2024-6535 Skupper: potential authentication bypass to skupper console via forged cookies 5.3 Medium2024-07-17
CVE-2024-5632 Longse NVR 安全漏洞 — NVR3608PGE2W 8.1AIHighAI2024-07-09
CVE-2024-4007 Hard coded default credential contained in install package — ASPECT Enterprise (ASP-ENT-x) 8.8 High2024-07-01
CVE-2024-27158 Hardcoded root password — Toshiba Tec e-Studio multi-function peripheral (MFP) 7.4 High2024-06-14
CVE-2024-5245 NETGEAR ProSAFE Network Management System Default Credentials Local Privilege Escalation Vulnerability — ProSAFE Network Management System 7.8AIHighAI2024-05-23
CVE-2024-4622 alpitronic Hypercharger EV Charger Use of Default Credentials — Hypercharger EV Charger 9.1AICriticalAI2024-05-15
CVE-2024-29844 Default credentials on web interface of Evolution Controller Versions allows attackers to login and perform administrative functions — Evolution Controller 9.8 Critical2024-04-14
CVE-2024-31069 IOSIX IO-1020 Micro ELD Use of Default Credentials — IO-1020 Micro ELD 7.4 High2024-04-12
CVE-2024-30210 IOSIX IO-1020 Micro ELD Use of Default Credentials — IO-1020 Micro ELD 7.4 High2024-04-12
CVE-2023-49621 Siemens SIMATIC CN 4100 安全漏洞 — SIMATIC CN 4100 9.8 Critical2024-01-09
CVE-2023-30801 qBittorrent Web UI Default Credentials Lead to RCE — qBittorrent client 9.8 Critical2023-10-10
CVE-2023-3703 Proscend Advice ICR Series routers fw version 1.76 — ICR Series routers FW 10.0 Critical2023-09-03
CVE-2023-30603 Hitron Technologies Inc. CODA-5310 - Using default credentials — Hitron CODA-5310 9.8 Critical2023-06-02

Vulnerabilities classified as CWE-1392 represent 77 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.