CWE · MITRE source
CWE-1392Use of Default Credentials
The product uses default credentials (such as passwords or cryptographic keys) for potentially critical functionality.
It is common practice for products to be designed to use default keys, passwords, or other mechanisms for authentication. The rationale is to simplify the manufacturing process or the system administrator's task of installation and deployment into an enterprise. However, if admins do not change the defaults, it is easier for attackers to bypass authentication quickly across multiple organizations.
Last updated: 09 May 2026 03:25 UTC
NIST 800-53 r5 controls that address this weakness (8)AI
Showing the 7 most specific. Generic controls that address many weakness types are collapsed below.
| Control | Title | Family | Why it addresses this CWE |
|---|---|---|---|
IA-1 | Policy and Procedures | IA | Policy requires changing or avoiding default credentials during system setup and operation. |
IA-2 | Identification and Authentication (Organizational Users) | IA | Unique identification requirement prevents use of default or shared credentials by organizational users. |
IA-5 | Authenticator Management | IA | Changing default authenticators prior to first use prevents use of default credentials. |
SA-4 | Acquisition Process | SA | Security functional requirements and acceptance criteria can stipulate that acquired systems must not use default credentials. |
SA-5 | System Documentation | SA | Documentation of known configuration vulnerabilities and secure setup practices reduces reliance on default credentials. |
CM-1 | Policy and Procedures | CM | Mandates replacement of default credentials during secure configuration and provisioning procedures. |
PM-30 | Supply Chain Risk Management Strategy | PM | Consistent implementation of the strategy drives removal or mitigation of default credentials in procured systems and services. |
Show 1 more broadly-applicable controls
IA-7 | Cryptographic Module Authentication | IA | Standards-compliant authentication mechanisms typically prohibit default credentials for cryptographic modules. |
Top CVEs of this weakness type, ranked by Risk Priority
| CVE | Risk | CVSS | EPSS | Published |
|---|---|---|---|---|
CVE-2024-12856 | 5.9 | 7.2 | 0.7389 | 2024-12-27 |
CVE-2024-4007 | 2.3 | 8.8 | 0.0953 | 2024-07-01 |
CVE-2023-30603 | 2.0 | 9.8 | 0.0070 | 2023-06-02 |
CVE-2023-3703 | 2.0 | 10.0 | 0.0008 | 2023-09-03 |
CVE-2023-30801 | 2.0 | 9.8 | 0.0063 | 2023-10-10 |
CVE-2023-49621 | 2.0 | 9.8 | 0.0015 | 2024-01-09 |
CVE-2024-29844 | 2.0 | 9.8 | 0.0009 | 2024-04-15 |
CVE-2024-6788 | 2.0 | 8.6 | 0.0454 | 2024-08-13 |
CVE-2024-7746 | 2.0 | 9.8 | 0.0033 | 2024-08-13 |
CVE-2024-12286 | 2.0 | 9.8 | 0.0043 | 2024-12-10 |
CVE-2025-30139 | 2.0 | 9.8 | 0.0025 | 2025-03-18 |
CVE-2025-51536 | 2.0 | 9.8 | 0.0018 | 2025-08-04 |
CVE-2025-8731 | 2.0 | 9.8 | 0.0025 | 2025-08-08 |
CVE-2025-35452 | 2.0 | 9.8 | 0.0015 | 2025-09-05 |
CVE-2025-55051 | 2.0 | 10.0 | 0.0006 | 2025-09-09 |
CVE-2025-35042 | 2.0 | 9.8 | 0.0017 | 2025-09-22 |
CVE-2025-10542 | 2.0 | 9.8 | 0.0018 | 2025-09-25 |
CVE-2025-34516 | 2.0 | 9.8 | 0.0017 | 2025-10-16 |
CVE-2025-54303 | 2.0 | 9.8 | 0.0005 | 2025-12-04 |
CVE-2022-50803 | 2.0 | 9.8 | 0.0010 | 2025-12-30 |
CVE-2026-26366 | 2.0 | 9.8 | 0.0007 | 2026-02-15 |
CVE-2026-26341 | 2.0 | 9.8 | 0.0020 | 2026-02-24 |
CVE-2026-27751 | 2.0 | 9.8 | 0.0006 | 2026-02-27 |
CVE-2026-22886 | 2.0 | 9.8 | 0.0020 | 2026-03-03 |
CVE-2024-28093 | 1.8 | 8.8 | 0.0011 | 2024-03-26 |