Weak Basic Authentication Credentials

Severity: High

Invicti detected weak credentials.

Depending on the nature of the password-protected resource, an attacker can mount one or more of the following types of attacks:
  • Access the contents of the password-protected resources.
  • Access password-protected administrative mechanisms such as "dashboard", "management console" and "admin panel," potentially progressing to gain full control of the application.
Do not use weak passwords, which are short, default, common or easy to guess. Implement a strong password policy.

Build your resistance to threats. And save hundreds of hours each month.

Get a demo See how it works