1. Home
  2. Web App Vulnerabilities
  3. How to remediate – Graylog2 Default Credentials

How to remediate – Graylog2 Default Credentials

1. Introduction

Graylog2 Default Credentials is a vulnerability where Graylog2 installations use known default usernames and passwords. This allows attackers to gain unauthorized access to log data, potentially exposing sensitive information and compromising system security. Systems running Graylog2 with unchanged default credentials are affected. A successful exploit could lead to confidentiality, integrity, and availability loss of the log collection and analysis system.

2. Technical Explanation

The vulnerability stems from using a pre-configured username and password for initial access to the Graylog2 web interface. An attacker can remotely connect to the Graylog2 instance and use these default credentials to gain administrative control. There is no CVE associated with this specific issue, but it falls under CWE-798: Use of Hardcoded Credentials. For example, an attacker could simply browse to the Graylog2 web interface and attempt to log in using the default username ‘admin’ and password ‘admin’. Affected versions include those shipped with default credentials enabled.

  • Root cause: The remote host uses a known set of default credentials for initial access.
  • Exploit mechanism: An attacker attempts login with default credentials to gain unauthorized access.
  • Scope: Graylog2 installations using default credentials are affected.

3. Detection and Assessment

You can confirm if a system is vulnerable by checking the running version of Graylog2 and verifying whether default credentials have been changed. A thorough method involves attempting to log in with the default username and password.

  • Quick checks: Check the Graylog2 web interface for version information, typically found on the ‘About’ page.
  • Scanning: Nessus plugin ID 16349 can detect this vulnerability as an example.
  • Logs and evidence: Examine Graylog2 logs for failed login attempts with default credentials. Log files are usually located in /var/log/graylog2/.
# Example command placeholder:
# No specific command available, check web interface or log files

4. Solution / Remediation Steps

The solution is to change the default credentials immediately. These steps ensure unauthorized access is prevented.

4.1 Preparation

  • Ensure you have a record of the current credentials for rollback purposes. A roll back plan involves restoring the previous configuration file.
  • A change window may be required depending on system criticality and approval processes.

4.2 Implementation

  1. Step 1: Log in to the Graylog2 web interface using the default credentials (admin/admin).
  2. Step 2: Navigate to System > Users > Change Password for the ‘admin’ user.
  3. Step 3: Enter a strong, unique password and confirm it.
  4. Step 4: Save the changes.

4.3 Config or Code Example

Before

# No configuration file example, password is changed via web interface

After

# Password has been updated in Graylog2 user settings. Verify new password works.

4.4 Security Practices Relevant to This Vulnerability

Several security practices can help prevent this issue. Least privilege reduces the impact of compromised credentials, while safe defaults encourage strong initial configurations.

  • Practice 1: Implement least privilege principles by limiting user access rights.
  • Practice 2: Enforce strong password policies to ensure complex and unique passwords are used.

4.5 Automation (Optional)

No suitable automation script is available for this specific vulnerability due to the web interface-based change process.

5. Verification / Validation

  • Post-fix check: Attempt to log in using ‘admin’ and the *new* password – should succeed.
  • Re-test: Attempt to log in using ‘admin’ and the *old* password – should fail.
# Post-fix command and expected output
# Login attempt with new password - successful login message

6. Preventive Measures and Monitoring

Regular security baselines and asset management processes can help prevent this issue. For example, update your security baseline to include a check for default credentials on Graylog2 installations.

  • Baselines: Update security baselines to require changing default credentials during initial setup.
  • Asset and patch process: Implement a regular review cycle for asset configurations, including password policies.

7. Risks, Side Effects, and Roll Back

  • Risk or side effect 1: Incorrect password entry may lead to account lockout.
  • Risk or side effect 2: Loss of access if the new password is forgotten and not recorded.
  • Roll back: Restore the previous Graylog2 configuration file from backup.

8. References and Resources

Links only to sources that match this exact vulnerability. Use official advisories and trusted documentation. Do not include generic links.

Updated on December 27, 2025

Was this article helpful?

Related Articles