Default login detected

firetail:default-login-endpoint-detected

Type:

Observation

Rule Severity:

Several

A service using a default login has been detected.

A default login endpoint indicates that the service is using default credentials, which are often pre-configured with the software or platform. These default credentials can pose significant security risks because they are widely known or can be easily found in documentation, making them vulnerable to brute-force or credential-stuffing attacks. Attackers can exploit these weak default credentials to gain unauthorized access to sensitive systems, potentially compromising the entire API or application.

Remediation

Change all possible settings (e.g. username, password, route) for any default accounts that come bundled or preinstalled with the software running this API.

Example Attack Scenario

An attacker scans a network for APIs with default login endpoints and gains access to a service that has not changed the default administrator username and password. Using a common default username like "admin" and a simple password such as "password123," the attacker successfully logs in and exploits the system. The attacker could then gain full control over the API, potentially stealing sensitive user data, disrupting services, or using the system to launch further attacks.

How to Identify with Example Scenario

How to Resolve with Example Scenario

How to Identify with Example Scenario

Find the text in bold to identify issues such as these in API specifications

How to Resolve with Example Scenario

Modify the text in bold to resolve issues such as these in API specifications
References:

More findings

All Findings