1 Default Credential Risks
Default credentials are pre-configured usernames and passwords shipped with software, devices, or services. When left unchanged in production, they are among the easiest vulnerabilities to exploit — default credential lists are publicly available and freely downloadable.
Common examples:
- admin/admin or admin/password on routers, admin panels
- MongoDB with no authentication in older default configs
- Jenkins with no login required by default (older versions)
- Database default users: MySQL root with empty password
- IoT devices: camera feeds accessible with default login
Developer passwords in production:
# .env file committed to source control
DB_PASSWORD=password123
ADMIN_PASSWORD=dev-only-change-before-deploy # Never changed!Attackers scan internet-facing services with tools like Shodan and use default credential databases to gain access in seconds.