Base · Medium

CWE-1394: Use of Default Cryptographic Key

The product uses a default cryptographic key for potentially critical functionality.

CWE-1394 · Base Level ·3 CVEs ·3 Mitigations

Description

The product uses a default cryptographic key for potentially critical functionality.

It is common practice for products to be designed to use default keys. The rationale is to simplify the manufacturing process or the system administrator's task of installation and deployment into an enterprise. However, if admins do not change the defaults, it is easier for attackers to bypass authentication quickly across multiple organizations.

Potential Impact

Authentication

Gain Privileges or Assume Identity

Mitigations & Prevention

Requirements High

Prohibit use of default, hard-coded, or other values that do not vary for each installation of the product - especially for separate organizations.

Architecture and Design High

Force the administrator to change the credential upon installation.

InstallationOperation Moderate

The product administrator could change the defaults upon installation or during operation.

Real-World CVE Examples

CVE IDDescription
CVE-2018-3825cloud cluster management product has a default master encryption key
CVE-2016-1561backup storage product has a default SSH public key in the authorized_keys file, allowing root access
CVE-2010-2306Intrusion Detection System (IDS) uses the same static, private SSL keys for multiple devices and installations, allowing decryption of SSL traffic

Frequently Asked Questions

What is CWE-1394?

CWE-1394 (Use of Default Cryptographic Key) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The product uses a default cryptographic key for potentially critical functionality.

How can CWE-1394 be exploited?

Attackers can exploit CWE-1394 (Use of Default Cryptographic Key) to gain privileges or assume identity. This weakness is typically introduced during the Architecture and Design phase of software development.

How do I prevent CWE-1394?

Key mitigations include: Prohibit use of default, hard-coded, or other values that do not vary for each installation of the product - especially for separate organizations.

What is the severity of CWE-1394?

CWE-1394 is classified as a Base-level weakness (Medium abstraction). It has been observed in 3 real-world CVEs.