Jump to content

Default Credential vulnerability

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Citation bot (talk | contribs) at 17:19, 3 October 2022 (Add: date. | Use this bot. Report bugs. | Suggested by Whoop whoop pull up | Category:Web security exploits | #UCB_Category 62/67). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

A Default Credential vulnerability is a type of vulnerability in a computing device that most commonly affects devices having some pre-set (default) administrative credentials to access all configuration settings. The vendor or manufacturer of such devices uses a single pre-defined set of admin credentials to access the device configurations, and any potential hacker can misuse this fact to hack such devices, if those credentials are not changed by consumers.[1]

Examples

There are several Proof-of-Concept (POC), as well as real world worms running across internet, which are configured to search for systems set with a default username and password. Voyager Alpha Force, Zotob, and MySpooler are a few examples of POC malware which scan the Internet for specific devices, and try to login using the default credentials.[1]

In the real world, many forms of malware, such as Mirai, have used this vulnerability. Once devices have been compromised by exploiting the Default Credential vulnerability, they can themselves be used for various harmful purposes, such as carrying out Distributed Denial of Service (DDoS) attacks. In one particular incident, a hacker was able to gain access and control of a large number of networks including those of University of Maryland, Baltimore County, Imagination, Capital Market Strategies L, by leveraging the fact that they were using the default credentials for their NetGear switch.[2]

References

  1. ^ a b "The Risk of Default Passwords". Sans Security Laboratory. SANS Technology Institute. Retrieved 3 June 2017.
  2. ^ "If your router is still using the default password, change it now!". IT World. IDG Communications, Inc. 7 December 2012. Retrieved 3 June 2017.

See also