Weak Basic Authentication Credentials

Severity: High
Summary#

Invicti detected weak credentials.

Impact#
Depending on the nature of the password-protected resource, an attacker can mount one or more of the following types of attacks:
  • Access the contents of the password-protected resources.
  • Access password-protected administrative mechanisms such as "dashboard", "management console" and "admin panel," potentially progressing to gain full control of the application.
Remediation#
Do not use weak passwords, which are short, default, common or easy to guess. Implement a strong password policy.

Build your resistance to threats. And save hundreds of hours each month.

Get a demo See how it works