Research Paper

The Water Sector's Default Password Problem

Author: Norris Cornell · Published: August 2025 · Version: Research Paper

Abstract

An exposé on how the water and wastewater industry’s reliance on default credentials leaves critical infrastructure open to compromise.

Abstract

Water and wastewater facilities are a prime target for adversaries seeking to disrupt essential services. Yet many of these systems are still secured by default usernames and passwords, sometimes hard‑coded and not changeable without vendor intervention. This paper documents the extent of the default credential problem in the water sector, examines high‑profile incidents enabled by poor authentication, and proposes policy and technical solutions.

Introduction

In 2021, attackers attempted to poison the municipal water supply in Oldsmar, Florida by adjusting the sodium hydroxide setpoint via a remote access system. Investigations revealed that the facility used a TeamViewer instance with a shared password for all operators. This is not an isolated case. Our analysis of hundreds of water utilities uncovers a pattern: PLCs, human‑machine interfaces (HMIs) and remote access platforms shipped with default credentials remain unchanged months or years into operation. We discuss why the industry is susceptible to this problem and the broader implications for critical infrastructure.

Extent of the problem

Case studies

  1. Oldsmar water system. An attacker changed chemical dosing setpoints after connecting via a remote access tool with a widely known password. A plant operator noticed the cursor move and intervened, preventing harm.
  2. Remote pumping station hack. In 2023, a regional pumping station’s control system was accessed remotely because its web interface used the default password published in the product manual. Attackers disabled alarms and pumps for hours.
  3. SCADA cloud portal compromise. Multiple water utilities use the same cloud portal with default credentials to view and control SCADA data. After a data breach, credentials were posted online and numerous systems were probed.

Why the water sector is vulnerable

Recommendations

Conclusion

The water sector is an essential service – but its reliance on default passwords makes it vulnerable to disruption. By eliminating default credentials, enforcing strong authentication and addressing regulatory gaps, we can reduce the risk of malicious actors tampering with public water supplies.

Citation

Cornell, N. (2025). The Water Sector’s Default Password Problem. Cornell Security Research Archive. https://www.cornellsecurity.com/research/the-water-sectors-default-password-problem

© 2025 Norris Cornell. This research may be cited with attribution. Redistribution or reproduction without permission is prohibited.


Citation

Cornell, N. (2025). The Water Sector's Default Password Problem. Cornell Security Research Archive. https://www.cornellsecurity.com/research/the-water-sectors-default-password-problem/