Cyber Posture

CWE · MITRE source

CWE-1188Initialization of a Resource with an Insecure Default

Abstraction: Base · CVEs in our corpus: 266

The product initializes or sets a resource with a default that is intended to be changed by the product's installer, administrator, or maintainer, but the default is not secure.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (10)AI

Control Title Family Why it addresses this CWE
CM-1Policy and ProceduresCMRequires documented secure initialization practices and avoidance of insecure defaults in configuration baselines.
CM-2Baseline ConfigurationCMReviewing and updating baseline when components are installed or upgraded prevents initialization with insecure defaults.
CM-7Least FunctionalityCMRequiring explicit configuration to minimal functionality overrides insecure defaults that would otherwise enable excess capabilities.
SA-16Developer-provided TrainingSAInstruction on secure initialization of security controls prevents leaving resources with insecure defaults after installation.
SA-4Acquisition ProcessSAMandating secure configuration and initialization requirements in the acquisition process prevents delivery of products that initialize resources with insecure defaults.
SA-5System DocumentationSASecure configuration and installation documentation prevents initialization of resources with insecure defaults.
PL-11Baseline TailoringPLTailoring replaces or augments insecure default initializations with system-specific values and compensating controls before deployment.
PL-9Central ManagementPLCentral configuration overrides or replaces insecure default initializations that would otherwise be left unchanged on each system.
PM-30Supply Chain Risk Management StrategyPMSCRM practices during acquisition and configuration management address insecure default initializations shipped by vendors.
RA-5Vulnerability Monitoring and ScanningRAScans detect resources initialized with insecure defaults that create exploitable conditions.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2020-13927 KEV9.69.80.94102020-11-10
CVE-2022-24706 KEV9.69.80.94372022-04-26
CVE-2023-27524 KEV8.88.90.84032023-04-24
CVE-2020-115327.39.80.89812020-05-08
CVE-2021-353367.19.80.85762021-07-01
CVE-2022-255686.67.50.85312022-03-24
CVE-2021-411926.48.10.79582021-11-24
CVE-2024-321146.18.50.72632024-05-02
CVE-2017-49715.75.90.75362017-06-13
CVE-2018-80145.39.80.55192018-05-16
CVE-2023-6448 KEV4.89.80.13292023-12-05
CVE-2018-167524.78.80.48742018-09-20
CVE-2020-140114.09.80.33832020-06-15
CVE-2021-387593.79.80.29732021-12-07
CVE-2025-48927 KEV3.65.30.09472025-05-28
CVE-2019-53673.29.80.20372019-06-05
CVE-2020-243652.68.80.14152020-09-24
CVE-2020-40012.69.80.09872020-11-24
CVE-2014-02342.59.80.08812020-02-12
CVE-2018-156852.48.10.12682018-08-23
CVE-2024-29122.410.00.07492024-04-16
CVE-2017-38342.39.80.06232017-04-06
CVE-2017-79642.210.00.02712017-04-19
CVE-2018-57702.29.80.03672018-03-20
CVE-2019-18042.29.80.04102019-05-03