How to Buy
This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.
One or more accounts on the remote host use a default password.
According to its self-reported version, the remote host is running a
release of Cisco Prime Network Control System prior to 1.1.2. As
such, it reportedly has the following vulnerabilities :
- The 'oracle' user account is secured with an unspecified,
default password. (CSCtz30468)
- The 'wcsdba' Oracle database account is secured with a
default password of 'wcs123'. (CSCub54624)
A remote, unauthenticated attacker could exploit this to log into the
system and change its configuration or disrupt services.
See also :
Upgrade to Cisco Prime Network Control System version 1.1.2 or later.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.2
Public Exploit Available : true
Nessus Plugin ID: 66861 ()
Bugtraq ID: 59013
CVE ID: CVE-2013-1170
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.