The article Analysis of 32 million breached passwords serves as a good reminder to use strong passwords for your accounts as it summarizes similarities in
Read MoreThe worst passwords of 2023 are also the most common
It’s that time of year where we look back at 2023 and see if we’ve gotten any better at choosing passwords. Unfortunately but not surprising,
Read MoreThe Most Common Passwords are Still Terrible
It feels like a broken record, but still in 2023 people are choosing bad passwords. As reported at Lifehacker.com, NordVPN researched the most common passwords
Read MoreTop 5 Services Regularly Scannned – Make Sure You Use Unique Passwords
All online services are regular scanned and attacked by the bad guys using large password dictionaries and caches of compromised credentials. As reported by Fox
Read MoreWorst Passwords of 2021
It’s that time of year again! Check out the top ten most used passwords of 2021 according to NordPass. If you see one on this
Read MoreThe Worst Passwords of 2020 Are Not Looking Good
A recent data list by NordPass shows that millions of people are still using extremely weak passwords for their various logins across the web. Passwords
Read MoreMost Frequently Used Passwords
Are you using a secure password? The National Cyber Security Centre has recently released a compiled list of the
Read More2018 Worst Passwords
Interesting information released from the makers of the password managers SplashID, TeamsID, and Gpass just released its annual “worst passwords†list. After analyzing over 5 million leaked passwords, the company
Read More17 of the Most Hackable Passwords of 2017
It is the year 2018 and though we’re not new to the idea of using stronger passwords, some people still choose to use easy-to-guess, very
Read MoreWhy Re-Using Passwords is Not a Good Idea
Are you a “Password Re-user”? Do you use the same passwords for multiple websites? Think of your password as a key. When you re-use passwords
Read MoreTA13-175A: Risks of Default Passwords on the Internet
Original release date: June 24, 2013
Systems Affected
Any system using password authentication accessible from the internet may be affected. Critical infrastructure and other important embedded systems, appliances, and devices are of particular concern.
Overview
Attackers can easily identify and access internet-connected systems that use shared default passwords. It is imperative to change default manufacturer passwords and restrict network access to critical and important systems.
Description
What Are Default Passwords?
Factory default software configurations for embedded systems, devices, and appliances often include simple, publicly documented passwords. These systems usually do not provide a full operating system interface for user management, and the default passwords are typically identical (shared) among all systems from a vendor or within product lines. Default passwords are intended for initial testing, installation, and configuration operations, and many vendors recommend changing the default password before deploying the system in a production environment.
What Is the Risk?
Attackers can easily obtain default passwords and identify internet-connected target systems. Passwords can be found in product documentation and compiled lists available on the internet. It is possible to identify exposed systems using search engines like Shodan, and it is feasible to scan the entire IPv4 internet, as demonstrated by such research as
- Shiny Old VxWorks Vulnerabilities
- Security Flaws in Universal Plug and Play: Unplug, Don’t Play
- Serial Offenders: Widespread Flaws in Serial Port Servers
- The Wild West
- Internet Census 2012
Attempting to log in with blank, default, and common passwords is a widely used attack technique.
Impact
An attacker with knowledge of the password and network access to a system can log in, usually with root or administrative privileges. Further consequences depend on the type and use of the compromised system. Examples of incident activity involving unchanged default passwords include
- Internet Census 2012 Carna Botnet distributed scanning
- Fake Emergency Alert System (EAS) warnings about zombies
- Stuxnet and Siemens SIMATIC WinCC software
- Kaiten malware and older versions of Microsoft SQL Server
- SSH access to jailbroken Apple iPhones
- Cisco router default Telnet and enable passwords
- SNMP community strings
Solution
Change Default Passwords
Change default passwords as soon as possible and absolutely before deploying the system on an untrusted network such as the internet. Use a sufficiently strong and unique password. See US-CERT Security Tip ST04-002 and Password Security, Protection, and Management for more information on password security.
Use Unique Default Passwords
Vendors can design systems that use unique default passwords. Such passwords may be based on some inherent characteristic of the system, like a MAC address, and the password may be physically printed on the system.
Use Alternative Authentication Mechanisms
When possible, use alternative authentication mechanisms like Kerberos, x.509 certificates, public keys, or multi-factor authentication. Embedded systems may not support these authentication mechanisms and the associated infrastructure.
Force Default Password Changes
Vendors can design systems to require password changes the first time a default password is used. Recent versions of DD-WRT wireless router firmware operate this way.
Restrict Network Access
Restrict network access to trusted hosts and networks. Only allow internet access to required network services, and unless absolutely necessary, do not deploy systems that can be directly accessed from the internet. If remote access is required, consider using VPN, SSH, or other secure access methods and be sure to change default passwords.
Vendors can design systems to only allow default or recovery password use on local interfaces, such as a serial console, or when the system is in maintenance mode and only accessible from a local network.
Identify Affected Products
It is important to identify software and systems that are likely to use default passwords. The following list includes software, systems, and services that commonly use default passwords:
- Routers, access points, switches, firewalls, and other network equipment
- Databases
- Web applications
- Industrial Control Systems (ICS) systems
- Other embedded systems and devices
- Remote terminal interfaces like Telnet and SSH
- Administrative web interfaces
Running a vulnerability scanner on your network can identify systems and services using default passwords. Freely available scanners include Metasploit and OpenVAS.
References
- Home Network Security
- Choosing and Protecting Passwords
- Password Security, Protection, and Management
- Small Office/Home Office Router Security
- The Risk of Default Passwords
- SHODAN – Computer Search Engine
- Shiny Old VxWorks Vulnerabilities
- Security Flaws in Universal Plug and Play: Unplug, Don’t Play
- Serial Offenders: Widespread Flaws in Serial Port Servers
- The Wild West
- Internet Census 2012
- Zombie hack blamed on easy passwords
- Secure EAS Codec s Prevent Zombie Attacks
- SCADA System’s Hard-Coded Password Circulated Online for Years
- After Worm, Siemens Says Don’t Change Passwords
- “Kaiten” Malicious Code Installed by Exploiting Null Default Passwords in Microsoft SQL Server
- Web Interface – DD-WRT Wiki
- Penetration Testing Software | Metasploit
- Open Vulnerability Assessment System
Revision History
- Initial release
This product is provided subject to this Notification and this Privacy & Use policy.
Read MoreAre We Still Using Weak Passwords?
In case you needed another reminder, your passwords should absolutely not be a single dictionary word. Â The news that over 8 million user password hashes
Read More