CWE · MITRE source
CWE-1393Use of Default Password
The product uses default passwords for potentially critical functionality.
It is common practice for products to be designed to use default passwords for authentication. The rationale is to simplify the manufacturing process or the system administrator's task of installation and deployment into an enterprise. However, if admins do not change the defaults, then it makes it easier for attackers to quickly bypass authentication across multiple organizations. There are many lists of default passwords and default-password scanning tools that are easily available from the World Wide Web.
Last updated: 09 May 2026 03:25 UTC
NIST 800-53 r5 controls that address this weakness (3)AI
| Control | Title | Family | Why it addresses this CWE |
|---|---|---|---|
IA-5 | Authenticator Management | IA | Changing default authenticators prior to first use prevents use of default passwords. |
IA-7 | Cryptographic Module Authentication | IA | Requires authentication that meets guidelines, avoiding default passwords for cryptographic module access. |
PM-16 | Threat Awareness Program | PM | Threat awareness programs disseminate botnet and scanning activity tied to default passwords, driving organizations to change or enforce non-default credentials before mass exploitation occurs. |
Top CVEs of this weakness type, ranked by Risk Priority
| CVE | Risk | CVSS | EPSS | Published |
|---|---|---|---|---|
CVE-2023-45249 KEV | 9.6 | 9.8 | 0.9346 | 2024-07-24 |
CVE-2023-32090 | 2.0 | 9.8 | 0.0035 | 2023-08-07 |
CVE-2023-24049 | 2.0 | 9.8 | 0.0012 | 2023-12-04 |
CVE-2024-29666 | 2.0 | 9.8 | 0.0032 | 2024-03-25 |
CVE-2024-30802 | 2.0 | 9.8 | 0.0037 | 2024-05-14 |
CVE-2024-50588 | 2.0 | 9.8 | 0.0037 | 2024-11-08 |
CVE-2024-51555 | 2.0 | 10.0 | 0.0018 | 2024-12-05 |
CVE-2025-26701 | 2.0 | 10.0 | 0.0017 | 2025-03-11 |
CVE-2025-22938 | 2.0 | 9.8 | 0.0039 | 2025-03-31 |
CVE-2025-27690 | 2.0 | 9.8 | 0.0049 | 2025-04-10 |
CVE-2025-8077 | 2.0 | 9.8 | 0.0009 | 2025-09-17 |
CVE-2025-66050 | 2.0 | 9.8 | 0.0006 | 2026-01-09 |
CVE-2026-24429 | 2.0 | 9.8 | 0.0012 | 2026-01-26 |
CVE-2026-2635 | 2.0 | 9.8 | 0.0115 | 2026-02-20 |
CVE-2026-22886 | 2.0 | 9.8 | 0.0020 | 2026-03-03 |
CVE-2026-33784 | 2.0 | 9.8 | 0.0005 | 2026-04-09 |
CVE-2022-4126 | 1.9 | 9.6 | 0.0041 | 2023-03-27 |
CVE-2023-25131 | 1.9 | 9.4 | 0.0100 | 2023-04-24 |
CVE-2024-29021 | 1.9 | 9.0 | 0.0163 | 2024-04-18 |
CVE-2026-4404 | 1.9 | 9.4 | 0.0006 | 2026-03-23 |
CVE-2024-49559 | 1.8 | 8.8 | 0.0019 | 2025-03-17 |
CVE-2025-2766 | 1.8 | 8.8 | 0.0006 | 2025-06-06 |
CVE-2023-28094 | 1.6 | 8.1 | 0.0029 | 2023-06-22 |
CVE-2023-43042 | 1.5 | 7.5 | 0.0013 | 2023-12-14 |
CVE-2024-48987 | 1.5 | 6.6 | 0.0273 | 2024-10-11 |