Cyber Posture

CWE · MITRE source

CWE-1392Use of Default Credentials

Abstraction: Base · CVEs in our corpus: 89

The product uses default credentials (such as passwords or cryptographic keys) for potentially critical functionality.

It is common practice for products to be designed to use default keys, passwords, or other mechanisms for authentication. The rationale is to simplify the manufacturing process or the system administrator's task of installation and deployment into an enterprise. However, if admins do not change the defaults, it is easier for attackers to bypass authentication quickly across multiple organizations.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (8)AI

Showing the 7 most specific. Generic controls that address many weakness types are collapsed below.

Control Title Family Why it addresses this CWE
IA-1Policy and ProceduresIAPolicy requires changing or avoiding default credentials during system setup and operation.
IA-2Identification and Authentication (Organizational Users)IAUnique identification requirement prevents use of default or shared credentials by organizational users.
IA-5Authenticator ManagementIAChanging default authenticators prior to first use prevents use of default credentials.
SA-4Acquisition ProcessSASecurity functional requirements and acceptance criteria can stipulate that acquired systems must not use default credentials.
SA-5System DocumentationSADocumentation of known configuration vulnerabilities and secure setup practices reduces reliance on default credentials.
CM-1Policy and ProceduresCMMandates replacement of default credentials during secure configuration and provisioning procedures.
PM-30Supply Chain Risk Management StrategyPMConsistent implementation of the strategy drives removal or mitigation of default credentials in procured systems and services.
Show 1 more broadly-applicable controls
IA-7Cryptographic Module AuthenticationIAStandards-compliant authentication mechanisms typically prohibit default credentials for cryptographic modules.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2024-128565.97.20.73892024-12-27
CVE-2024-40072.38.80.09532024-07-01
CVE-2023-306032.09.80.00702023-06-02
CVE-2023-37032.010.00.00082023-09-03
CVE-2023-308012.09.80.00632023-10-10
CVE-2023-496212.09.80.00152024-01-09
CVE-2024-298442.09.80.00092024-04-15
CVE-2024-67882.08.60.04542024-08-13
CVE-2024-77462.09.80.00332024-08-13
CVE-2024-122862.09.80.00432024-12-10
CVE-2025-301392.09.80.00252025-03-18
CVE-2025-515362.09.80.00182025-08-04
CVE-2025-87312.09.80.00252025-08-08
CVE-2025-354522.09.80.00152025-09-05
CVE-2025-550512.010.00.00062025-09-09
CVE-2025-350422.09.80.00172025-09-22
CVE-2025-105422.09.80.00182025-09-25
CVE-2025-345162.09.80.00172025-10-16
CVE-2025-543032.09.80.00052025-12-04
CVE-2022-508032.09.80.00102025-12-30
CVE-2026-263662.09.80.00072026-02-15
CVE-2026-263412.09.80.00202026-02-24
CVE-2026-277512.09.80.00062026-02-27
CVE-2026-228862.09.80.00202026-03-03
CVE-2024-280931.88.80.00112024-03-26