Welcome to the official website of ESTL!
Follow WeChat
Current location: Home > News > Certification news > Technical information
Service Hotline
+86 13925582920Phone: +86-0769-85075888 to 6617
Fax: +86-0769-85075898
Mailbox: net03@gtggroup.com
Address: 2st floor, B Area, Jinbaisheng Industrial Park, Headquarters 2 Road, Songshan Lake Hi-tech Industrial Development Zone, Dongguan City, Guangdong Pr., China.
Editor:ESTL Category:Technical information Release time:2026-04-08 Click volume:5
Many engineers’ first reaction is:Isn’t this old news?It’s not a problem anymore.Who still uses admin/admin?
Yet in lab assessments, default password issues remain one of the top failure points.
And under JC‑STAR, this is not a minor deduction —it’s a red line.
Here’s a very practical logic:If an attack requires no skill whatsoever, it’s not an attack — it’s a design flaw.
That’s exactly the problem with default passwords:
All it takes is checking the manual, a sticker, or a quick online search.
For consumers, this isn’t “you didn’t change the password.”It means:The product you bought is insecure by design.
In the Japanese market, this is unacceptable.
This is where many manufacturers fall into a trap.
Common misunderstanding:The device has a default password, but users can change it.
JC‑STAR’s definition:The device must be secure before the user takes any active security action.
This means the following all count as default password risks:
In short:Any password that can be guessed or derived at scale is essentially a default password.
Here’s a real-world view.
Labs don’t just:Try logging in once.
They evaluate systematically:
Point 4, in particular,is a hidden landmine many products completely overlook.
These three often lead to direct failure in assessments.
Result: Not allowed.
Pay attention to the word: recommend.
In JC‑STAR terms:Recommend = optional = risk still exists.
Result: Almost certain failure in lab testing.
There is only one core approach JC‑STAR accepts:Forced Initialization
Requirements include:
This is not a “security bonus.”It is the minimum security baseline.
Many manufacturers fail here.
If:
From JC‑STAR’s perspective:You are essentially recreating an insecure device every time.
The correct approach:Factory reset ≠ revert to weak stateSecure initialization must still be performed again.
Frankly speaking:JC‑STAR isn’t just making you add one more security step.
It’s forcing you to answer one question:Is your product still secure under the worst real‑world usage?
Even under these conditions,can your product still be safe?
Default passwords are only the first hurdle.
Next article:Device, App, and Cloud Pairing & Binding: Who Trusts Whom?
If this step is designed incorrectly,all the later encryption and certificateswill only be “tape” patching a flawed architecture.
With this article,you’ve officially entered the JC‑STAR practical battle zone.
Label: JC‑STAR mandatory initialization JC‑STAR factory reset security default password risk JC‑STAR Japanese IoT security standard JC‑STAR default password JC‑STAR lab test JC‑STAR red line
Focus on Wechat
Public Number