Welcome to the official website of ESTL!
Follow WeChat
Current location: Home > News > Certification news > Certification information
Service Hotline
+86 13925582920Phone: +86-0769-85075888 to 6617
Fax: +86-0769-85075898
Mailbox: net03@gtggroup.com
Address: 2st floor, B Area, Jinbaisheng Industrial Park, Headquarters 2 Road, Songshan Lake Hi-tech Industrial Development Zone, Dongguan City, Guangdong Pr., China.
Editor:ESTL Category:Certification information Release time:2026-04-29 Click volume:4
When reviewing JC-STAR requirements, you will notice one detail is repeatedly emphasized: default passwords.
Most engineers think this is an old, basic issue.No one still uses simple credentials such as admin/admin.
Even so, default password failures remain the top non-compliance item in JC-STAR testing.In the JC-STAR framework, this is not a minor deduction issue — it is a zero-tolerance red line.
Japan follows a clear security logic:If unauthorized access requires no technical skills, it is not a vulnerability — it is a flawed product design.
Default password risks require no hacking techniques, no reverse engineering, and no specialized tools.Credentials can be easily found on labels, user manuals, or public websites.
From the Japanese consumer perspective:Weak default settings mean the device is inherently unsafe out of the box.Such design defects are unacceptable in the Japanese market.
Most manufacturers misunderstand the rule:As long as users can change the password, default settings are acceptable.
JC-STAR defines security differently:Devices must remain secure before users take any active security action.
The following scenarios are all classified as default password risks:
In short:Any credential that can be mass-predicted or easily obtained is treated as an invalid default password.
Inspections are not limited to simple login attempts.Evaluators conduct systematic verification:
The fourth item is the most overlooked high-risk point for manufacturers.
These three seemingly reasonable designs are directly rejected in JC-STAR assessment:
1. Initial passwords generated from SN/MACSerial numbers are usually exposed or queryable through device interfaces, making passwords predictable and mass-exploitable.
2. “Recommended” password change on first useIn JC-STAR rules, the word recommended means optional.Optional security steps cannot eliminate inherent risks.
3. Password updated only on App sideIf local interfaces, legacy protocols, or background access remain unlocked,the device is still considered high-risk despite App-side security improvements.
Only one core solution is recognized:Mandatory security initialization
Key requirements:
This is not an optional security upgrade — it is the fundamental safety baseline.
Many products revert to default weak status after factory restoration.If remote access remains available after reset,the device will be regarded as repeatedly exposing public security risks.
Qualified design rule:Factory reset does not restore weak default status.The device must require full security re-initialization after restoration.
JC-STAR is not simply forcing manufacturers to add extra security steps.It forces brands to answer one core question:
Is your product still secure under the worst user habits?
Products must maintain basic protection even in passive, low-awareness usage scenarios.
Label: Japanese smart device regulation JC-STAR default password rule factory reset security risk Japan IoT security red line JC-STAR compliance failure forced initialization IoT
Focus on Wechat
Public Number