Cisco Prime Network Control System Default Credentials (cisco-sa-20130410-ncs)

High Nessus Plugin ID 66861


One or more accounts on the remote host use a default password.


According to its self-reported version, the remote host is running a release of Cisco Prime Network Control System prior to 1.1.2. As such, it reportedly has the following vulnerabilities :

- The 'oracle' user account is secured with an unspecified, default password. (CSCtz30468)

- The 'wcsdba' Oracle database account is secured with a default password of 'wcs123'. (CSCub54624)

A remote, unauthenticated attacker could exploit this to log into the system and change its configuration or disrupt services.


Upgrade to Cisco Prime Network Control System version 1.1.2 or later.

See Also

Plugin Details

Severity: High

ID: 66861

File Name: cisco-sa-20130410-ncs.nasl

Version: 1.7

Type: local

Family: CISCO

Published: 2013/06/11

Updated: 2018/11/15

Dependencies: 66860

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:prime_network_control_system

Required KB Items: Host/Cisco/Prime_NCS/Version

Exploit Available: false

Exploit Ease: No exploit is required

Patch Publication Date: 2013/04/10

Vulnerability Publication Date: 2013/04/10

Reference Information

CVE: CVE-2013-1170

BID: 59013