IoT Security Fiasco: The Return of Hard-Coded Username ‘123’

In a twist of cybersecurity comedy, a hard-coded username and password vulnerability from 2017 decided to make a grand reappearance, with “123” as the password. It seems hackers are still trying to crack open the IoT kingdom with a predictable combo reminiscent of a luggage lock. CVE-2017-17761, anyone?

Pro Dashboard

Hot Take:

Well, it looks like someone finally found the vintage wine in the cellar of cybersecurity vulnerabilities! It’s 2023, and we’re dusting off a 2017 classic: a hard-coded password vulnerability that’s been aging like milk. Who knew a username and password combo as simple as “123” could be the key to a hacker’s heart? Maybe the Internet of Things should change its name to the Internet of Terrible Security. Cheers to Ichano for this belated blast from the past!

Key Points:

  • A 2017 vulnerability involving a hard-coded username and password (“123”) has resurfaced.
  • The vulnerability was identified in Ichano products and is logged as CVE-2017-17761.
  • The vulnerability involves default IoT usernames like “root”, “admin”, and “gast”.
  • IPs from various countries, including the US, Japan, and Australia, are scanning for these credentials.
  • It’s unclear if Ichano ever resolved this issue, so it’s like leaving your front door open for six years.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?