Last update: February 19, 2023 Use of Weak Credentials The product uses weak credentials (such as a default key or hard-coded password) that can be calculated, derived, reused, or guessed by an attacker.