CAPEC-70: Try Common or Default Usernames and Passwords

ID CAPEC-70
Typical Severity High
Likelihood Of Attack Medium
Status Draft

An adversary may try certain common or default usernames and passwords to gain access into the system and perform unauthorized actions. An adversary may try an intelligent brute force using empty passwords, known vendor default credentials, as well as a dictionary of common usernames and passwords. Many vendor products come preconfigured with default (and thus well-known) usernames and passwords that should be deleted prior to usage in a production environment. It is a common mistake to forget to remove these default login credentials. Another problem is that users would pick very simple (common) passwords (e.g. "secret" or "password") that make it easier for the attacker to gain access to the system compared to using a brute force attack or even a dictionary attack using a full dictionary.

https://capec.mitre.org/data/definitions/70.html

Weaknesses

# ID Name Type
CWE-262 Not Using Password Aging weakness
CWE-263 Password Aging with Long Expiration weakness
CWE-308 Use of Single-factor Authentication weakness
CWE-309 Use of Password System for Primary Authentication weakness
CWE-521 Weak Password Requirements weakness
CWE-654 Reliance on a Single Factor in a Security Decision weakness
CWE-798 Use of Hard-coded Credentials weakness

Taxonomiy Mapping

Type # ID Name
ATTACK 1078.001 Valid Accounts:Default Accounts
Loading...