Hardcoded Credentials

Description

Adversaries may leverage credentials that are hardcoded in software or firmware to gain an unauthorized interactive user session to an asset. Examples credentials that may be hardcoded in an asset include: Username/Passwords, Cryptographic keys/Certificates, API tokens, Unlike Default Credentials, these credentials are built into the system in a way that they either cannot be changed by the asset owner, or may be infeasible to change because of the impact it would cause to the control system operation. These credentials may be reused across whole product lines or device models and are often not published or known to the owner and operators of the asset.

Products, Sensors, and Dependencies

ProductDependenciesData sourceAccess requiredProtocolData CollectedNotes
Tenable Vulnerability ManagementComputerActive vulnerabilities detected by Tenable Vulnerability Management plugins
Tenable OT SecurityOT DeviceActive vulnerabilities detected by detected by Tenable OT Security plugins

Attack Path Technique Details

Framework: MITRE ATT&CK

Family: Lateral Movement, Persistence

Sub-Technique: Hardcoded Credentials

Platform: None

Tenable Release Date: 2024 Q2