Summary
Acunetix 360 detected weak credentials.
Impact
Depending on the nature of the password-protected resource, an attacker can mount one or more of the following types of attacks:
- Access the contents of the password-protected resources.
- Access password-protected administrative mechanisms such as "dashboard", "management console" and "admin panel," potentially progressing to gain full control of the application.
Remediation
Do not use weak passwords, which are short, default, common or easy to guess. Implement a strong password policy.