
Where a device needs a username and/or password to log in, a default password is usually provided to access the device during its initial setup, or after resetting it to the factory default settings.
Manufacturers of such equipment typically use a simple password, such as admin or password on all equipment they ship, expecting users to change the password during configuration. The default username and password are usually found in the instruction manual (common for all devices) or on the device itself.[citation needed]
Default passwords are one of the major contributing factors to large-scale compromises of home routers.[1] Leaving such a password on devices available to the public is a major security risk.[2][3][4][5] Several Proof-of-Concept (POC) demonstrations were made, and active “worms” ran across the Internet searching for systems having the default username and password. Voyager Alpha Force, Zotob, and MySpooler are a few examples of POC malware which scan the Internet for specific devices and try to log in using default credentials.[6]
In the real world, many forms of malware, such as Mirai, have used this vulnerability. Once devices have been compromised by exploiting the Default Credential vulnerability, they can themselves be used for various harmful purposes, such as carrying out Distributed Denial of Service (DDoS) attacks. In one incident, a hacker gained access and control of a large number of networks including those of University of Maryland, Baltimore County, Imagination, and Capital Market Strategies L, simply because they hadn’t changed their NetGear switches from the default credentials.[7]
Some devices (such as wireless routers) have unique default router usernames and passwords printed on a sticker, which is more secure than a common default password. However, some vendors derived the unique default passwords from the device’s MAC addresses using a known algorithm, and attackers easily computed the same passwords.[8]
See also
References
- ^ Niemietz, Marcus; Schwenk, Joerg (2015). “Owning Your Home Network: Router Security Revisited”. arXiv:1506.04112 [cs.CR].
- ^ “The Risk of Default Passwords”. Security Laboratory: Methods of Attack Series. SANS. Retrieved June 16, 2015.
- ^ Opaska, Walter P. (1986-09-01). “Closing the VAX Default Password “Backdoor”“. EDPACS. 14 (3): 6–9. doi:10.1080/07366988609450370. ISSN 0736-6981.
- ^ Nam, Sungyup; Jeon, Seungho; Kim, Hongkyo; Moon, Jongsub (2020-05-31). “Recurrent GANs Password Cracker For IoT Password Security Enhancement”. Sensors. 20 (11): 3106. Bibcode:2020Senso..20.3106N. doi:10.3390/s20113106. PMC 7309056. PMID 32486361.
- ^ Shafiq, Muhammad; Gu, Zhaoquan; Cheikhrouhou, Omar; Alhakami, Wajdi; Hamam, Habib (2022-08-03). Lakshmanna, Kuruva (ed.). “The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT-Based Security Attacks”. Wireless Communications and Mobile Computing. 2022: 1–12. doi:10.1155/2022/8669348. ISSN 1530-8677.
- ^ “The Risk of Default Passwords”. Sans Security Laboratory. SANS Technology Institute. Retrieved 3 June 2017.
- ^ Pinola, Melanie (7 December 2012). “If your router is still using the default password, change it now!”. Computerworld. Retrieved 14 April 2026.
- ^ “Reversing D-Link’s WPS Pin Algorithm”. Embedded Device Hacking. 31 October 2014. Retrieved June 16, 2015.