Common Information
Type Value
Value
Default Accounts - T1078.001
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Default accounts are those that are built-into an OS, such as the Guest or Administrator accounts on Windows systems. Default accounts also include default factory/provider set accounts on other types of systems, software, or devices, including the root user account in AWS and the default service account in Kubernetes.(Citation: Microsoft Local Accounts Feb 2019)(Citation: AWS Root User)(Citation: Threat Matrix for Kubernetes) Default accounts are not limited to client machines, rather also include accounts that are preset for equipment such as network devices and computer applications whether they are internal, open source, or commercial. Appliances that come preset with a username and password combination pose a serious threat to organizations that do not change it post installation, as they are easy targets for an adversary. Similarly, adversaries may also utilize publicly disclosed or stolen [Private Keys](https://attack.mitre.org/techniques/T1552/004) or credential materials to legitimately connect to remote environments via [Remote Services](https://attack.mitre.org/techniques/T1021).(Citation: Metasploit SSH Module)
Details Published Attributes CTI Title
Details Website 2025-03-21 2 A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
Details Website 2025-03-20 2 Are Attackers "Passing Through" Your Azure App Proxy?
Details Website 2025-03-20 2 A Vulnerability in AMI MegaRAC Software Could Allow for Remote Code Execution
Details Website 2025-03-18 2 Are Attackers "Passing Though" Your Azure App Proxy?
Details Website 2025-03-18 2 A Vulnerability in Apache Tomcat Could Allow for Remote Code Execution
Details Website 2025-03-14 7 MS-ISAC CYBERSECURITY ADVISORY - Multiple Vulnerabilities in Sante PACS Server Could Allow for Remote Code Execution - PATCH NOW - TLP: CLEAR
Details Website 2025-03-13 96 Inside BRUTED: Black Basta (RaaS) Members Used Automated Brute Forcing Framework to Target Edge Network Devices
Details Website 2025-03-11 5 *DRAFT* MS-ISAC CYBERSECURITY ADVISORY - Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution - PATCH: NOW - TLP: CLEAR
Details Website 2025-03-11 7 Critical Patches Issued for Microsoft Products, March 11, 2025
Details Website 2025-03-11 38 Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Details Website 2025-03-11 19 Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
Details Website 2025-03-07 0 Cybersecurity Essentials: A Complete Overview
Details Website 2025-03-04 4 Multiple vulnerabilities have been discovered in VMware ESXi, Workstation, and Fusion which could allow for local code execution.
Details Website 2025-03-02 0 Harden a Simple Website — Database
Details Website 2025-02-28 0 Database Security Best Practices: Protecting Your Data from Attacks
Details Website 2025-02-26 10 Cyber Threat Intelligence (CTI) Report: CVE-2023–20118 — Cisco Small Business Routers Remote Code…
Details Website 2025-02-26 4 Identity Security Is the Missing Link To Combatting Advanced OT Threats
Details Website 2025-02-18 7 Threat Spotlight: Inside the World's Fastest Rising Ransomware Operator — BlackLock - ReliaQuest
Details Website 2025-02-12 20 OWASP Top 10 Vulnerabilities in .NET Core 7+ (and How to Beat Them)
Details Website 2025-02-11 47 Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Details Website 2025-02-11 12 Multiple Vulnerabilities in Fortinet Products Could Allow for Remote Code Execution
Details Website 2025-02-11 2 Critical Patches Issued for Microsoft Products, February 11, 2025
Details Website 2025-02-07 3 Zyxel HTTP Vulnerability - Blog - VulnCheck
Details Website 2025-02-06 2 A Vulnerability in Trimble Cityworks Could Allow for Remote Code Execution
Details Website 2025-02-04 6 Zyxel Telnet Vulnerabilities - Blog - VulnCheck