WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships CISA Urges Manufacturers Eliminate Default Passwords to Thwart Cyber Threats
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

CISA Urges Manufacturers Eliminate Default Passwords to Thwart Cyber Threats

Author: ian_41208

Created: Tuesday, December 19, 2023 - 19:32

Categories: Cybersecurity

As part of CISA’s new Security by Design (SbD) Alert series, the agency published guidance on how manufacturers can protect customers by eliminating default passwords. The development comes after CISA sent out an alert earlier this month, stating Iranian actors affiliated with the Islamic Revolutionary Guard Corps have been actively exploiting operational technology devices with default passwords to gain access to critical infrastructure systems in the U.S.

CISA urges manufacturers to get rid of these default passwords on internet-exposed systems to prevent actors from using the credentials to gain initial access to and move laterally within organizations. According to CISA, factory default software configurations for embedded systems, devices, and appliances often include publicly documented passwords. Although these default passwords are intended for initial testing, installation, and configuration operations, many organizations tend to leave them unchanged, enabling actors to use tools like Shodan to scan for internet-exposed endpoints and breach them using these default credentials. Manufacturers should change default passwords before deploying any of their systems in a production environment. Using unique credentials and rotating these passwords regularly can prevent actors from gaining access to systems. It’s also important to enable multifactor authentication, when possible, as this adds an additional layer of defense that an actor must get through. Read more at the Hacker News

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar