Vulnerability

Default Credentials
detect, understand, remediate

Default credentials provide attackers with immediate, unauthenticated access to systems and applications. They are among the first things automated scanners and botnets check.

No credit card required. Free plan available forever.

Severity

Critical

CWE ID

CWE-798

OWASP Top 10

A07:2021 – Identification and Authentication Failures

CVSS 3.1 Score

9.8

What are default and weak credentials?

Default credentials are factory-set usernames and passwords shipped with hardware devices, software applications, databases, and cloud services. When administrators fail to change these well-known credentials after deployment, attackers can gain immediate, authenticated access without any exploitation, simply by trying the default login documented in the product manual.

Weak credentials extend beyond defaults to include easily guessable passwords (admin/admin, password123, company name + year), credentials reused across multiple systems, and accounts without multi-factor authentication. Attackers maintain extensive databases of default credentials for thousands of products and routinely scan the internet for devices and services using them.

The impact is often catastrophic because default credentials frequently grant administrative access. A compromised admin account gives attackers complete control over the system, enabling data exfiltration, configuration changes, backdoor installation, and lateral movement to other systems on the network. Default credentials on network devices (routers, firewalls, switches) can compromise the entire network infrastructure.

How it works

1

Identify target service

Attacker discovers an exposed service (a web admin panel, database server, IoT device, or network appliance) through port scanning or web enumeration.

2

Fingerprint the product

The product and version are identified from login pages, HTTP headers, banners, or error messages to look up the corresponding default credentials.

3

Try default credentials

The attacker attempts login using known default username/password combinations from public databases (e.g. admin/admin, root/root, admin/password).

4

Gain administrative access

If the defaults were never changed, the attacker gains full administrative access and can reconfigure the system, extract data, or establish persistent access.

Common causes

Not changing defaults after deployment

Administrators deploy systems and forget (or choose not) to change the factory default credentials, especially on internal systems assumed to be safe from attack.

No forced password change on first login

Products that don't require a password change during initial setup allow default credentials to persist indefinitely in production environments.

Using common or weak passwords

Choosing easily guessable passwords (Password1!, company name, seasonal patterns like Summer2026!) that appear in common wordlists used for brute-force attacks.

No credential rotation policy

Service accounts and system credentials that are never rotated. Once set, they remain unchanged for years, increasing the window for credential theft and reuse.

How to detect it

Automated detection

  • SecPortal's authenticated scanner tests discovered services against comprehensive default credential databases covering thousands of products
  • External scanning identifies exposed admin panels, database ports, and management interfaces that are common default credential targets
  • Code scanning detects hardcoded credentials, default passwords in configuration files, and embedded secrets in source code

Manual testing

  • Attempt login with common default credential pairs (admin/admin, admin/password, root/root, admin/changeme) on all discovered services
  • Look up product-specific default credentials in vendor documentation and public default credential databases
  • Test for weak password policies by attempting common passwords, company-specific terms, and seasonal patterns against user accounts

How to fix it

Force password change on deployment

Require all default credentials to be changed during initial setup. Use deployment checklists and automation to ensure no system goes live with factory defaults.

Enforce strong password policies

Require passwords of at least 12 characters with complexity requirements. Block passwords that appear in known breach databases or common wordlists.

Implement privileged access management (PAM)

Use a PAM solution to manage, rotate, and audit privileged credentials. Vault service account passwords and inject them at runtime rather than hardcoding them.

Run credential scanning regularly

Scan your infrastructure for default credentials on a regular schedule. Include new deployments in the scanning scope and remediate findings before going to production.

Conduct regular credential audits

Periodically audit all service accounts, system credentials, and administrative passwords to verify they meet security standards and have been rotated recently.

Compliance impact

Find default credentials in your infrastructure

SecPortal's external scanner identifies exposed admin panels and common default credential patterns. Start free.

No credit card required. Free plan available forever.