Cyber Posture

CWE · MITRE source

CWE-798Use of Hard-coded Credentials

Abstraction: Base · CVEs in our corpus: 1,672

The product contains hard-coded credentials, such as a password or cryptographic key.

There are two main variations:

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (21)AI

Showing the 15 most specific. Generic controls that address many weakness types are collapsed below.

Control Title Family Why it addresses this CWE
SA-12Supply Chain ProtectionSASupplier evaluation and secure acquisition practices make it harder for hard-coded credentials to be introduced via procured products.
SA-13TrustworthinessSAReduces hard-coded credentials by requiring that trustworthiness evidence includes absence of embedded secrets that bypass normal authentication.
SA-21Developer ScreeningSAVetting reduces the chance a developer will deliberately insert hard-coded credentials as a backdoor or unauthorized access mechanism.
IA-1Policy and ProceduresIAPolicy and procedures prohibit hard-coded credentials in favor of managed authentication.
IA-13Identity Providers and Authorization ServersIAExternal identity providers eliminate the need for hard-coded credentials in applications.
IA-5Authenticator ManagementIAChanging default authenticators prior to first use and protecting content prevents use of hard-coded credentials.
PM-16Threat Awareness ProgramPMIntelligence programs surface reports of campaigns that abuse hard-coded credentials in products, prompting removal or replacement and thereby reducing successful exploitation.
PM-3Information Security and Privacy ResourcesPMPlanned investment enables secure credential storage and management systems instead of hard-coded credentials.
PM-30Supply Chain Risk Management StrategyPMStrategy enforces supplier requirements and code reviews that reduce hard-coded credentials introduced through acquired products.
SR-1Policy and ProceduresSRPolicy and procedures require review of procured products for hard-coded credentials, reducing the chance they are introduced via the supply chain.
SR-6Supplier Assessments and ReviewsSRSupplier risk reviews identify and discourage hard-coded credentials in delivered products or services.
AC-9Previous Logon NotificationACEnables users to notice when hard-coded credentials have been exploited for unauthorized access.
AT-3Role-based TrainingATSecurity training explicitly warns against hard-coded credentials, lowering their use in systems.
PL-9Central ManagementPLCentral credential stores and rotation policies remove the need for hard-coded credentials in configuration files or code.
PS-2Position Risk DesignationPSVetting individuals before they occupy roles that touch credentials or secrets reduces the likelihood of hard-coded credentials being introduced or abused.
Show 6 more broadly-applicable controls
SA-3System Development Life CycleSAIntegrating risk management and security responsibilities into the SDLC makes use of hard-coded credentials visible during design and code reviews, reducing their introduction.
SA-4Acquisition ProcessSARequiring security functional requirements and acceptance criteria allows contracts to prohibit hard-coded credentials in delivered systems or components.
SA-5System DocumentationSAKnown vulnerabilities section of admin docs covers hard-coded credentials and how to replace them, limiting their use in deployments.
RA-10Threat HuntingRAAnomalous use of hard-coded credentials can be uncovered through behavioral and log analysis during hunts.
SC-38Operations SecuritySCMakes hard-coded credentials less likely by requiring OPSEC treatment of authentication material as protected information throughout development.
SI-5Security Alerts, Advisories, and DirectivesSIAdvisories about products containing hard-coded credentials allow organizations to apply mitigations or avoid affected components before exploitation.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2022-26138 KEV9.69.80.94322022-07-20
CVE-2024-3272 KEV9.69.80.94112024-04-04
CVE-2024-28987 KEV9.59.10.94292024-08-21
CVE-2020-8657 KEV9.39.80.88862020-02-06
CVE-2024-20439 KEV9.19.80.86312024-09-04
CVE-2022-28810 KEV8.86.80.90712022-04-18
CVE-2025-30406 KEV8.89.00.83402025-04-03
CVE-2019-6693 KEV7.66.50.72222019-11-21
CVE-2020-118547.59.80.92402020-10-27
CVE-2021-227077.59.80.91572021-07-21
CVE-2023-224637.59.80.91522023-01-04
CVE-2023-50747.59.80.92092023-09-20
CVE-2024-73327.59.80.92112024-08-01
CVE-2025-14611 KEV7.59.80.58352025-12-12
CVE-2020-44297.49.80.90702020-05-07
CVE-2024-34087.49.80.90542024-06-06
CVE-2019-19357.39.80.89072019-08-21
CVE-2020-268797.39.80.88902020-10-26
CVE-2024-228537.29.80.86922024-02-06
CVE-2019-163137.17.50.94002019-09-14
CVE-2019-159757.19.80.85142020-01-06
CVE-2022-11627.19.10.87612022-04-04
CVE-2022-354137.19.80.85972022-09-13
CVE-2016-15606.99.80.81672017-04-21
CVE-2020-353386.99.80.81952020-12-14