Backslash Vulnerability Database Use of Default Cryptographic Key
Use of Default Cryptographic Key
CWE-1394
Short description
The product uses a default cryptographic key for potentially critical functionality.
Extended description
It is common practice for products to be designed to use
default keys. The rationale is to simplify the manufacturing
process or the system administrator's task of installation and
deployment into an enterprise. However, if admins do not
change the defaults, it is easier for attackers to bypass
authentication quickly across multiple organizations.
Best practices to prevent this CWE
Phase: Requirements
Prohibit use of default, hard-coded, or other values that do not vary for each installation of the product - especially for separate organizations.
Effectiveness: High
Phase: Architecture and Design
Force the administrator to change the credential upon installation.
Effectiveness: High
Phase: Installation; Operation
The product administrator could change the defaults upon installation or during operation.