Information
Default passwords should be considered 'well known' to attackers. Consequently, if default passwords remain in place any attacker with access to the database then has the ability to authenticate as the user with that default password. When default passwords are altered, this circumstance is mitigated.
Solution
To remediate this recommendation, you may perform either of the following actions. Manually issue the following SQL statement for each USERNAME returned in the Audit Procedure: PASSWORD <username> Execute the following SQL script to randomly assign passwords: begin for r_user in (select username from dba_users_with_defpwd where username not like '%XS$NULL%') loop DBMS_OUTPUT.PUT_LINE('Password for user '||r_user.username||' will be changed.'); execute immediate 'alter user ''||r_user.username||'' identified by ''||DBMS_RANDOM.string('a',16)||''account lock password expire'; end loop;end;/