Cisco Prime Network Control System Default Credentials (cisco-sa-20130410-ncs)

high Nessus Plugin ID 66861


One or more accounts on the remote host use a default password.


According to its self-reported version, the remote host is running a release of Cisco Prime Network Control System prior to 1.1.2. As such, it reportedly has the following vulnerabilities :

- The 'oracle' user account is secured with an unspecified, default password. (CSCtz30468)

- The 'wcsdba' Oracle database account is secured with a default password of 'wcs123'. (CSCub54624)

A remote, unauthenticated attacker could exploit this to log into the system and change its configuration or disrupt services.


Upgrade to Cisco Prime Network Control System version 1.1.2 or later.

See Also

Plugin Details

Severity: High

ID: 66861

File Name: cisco-sa-20130410-ncs.nasl

Version: 1.7

Type: local

Family: CISCO

Published: 6/11/2013

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:cisco:prime_network_control_system

Required KB Items: Host/Cisco/Prime_NCS/Version

Exploit Ease: No exploit is required

Patch Publication Date: 4/10/2013

Vulnerability Publication Date: 4/10/2013

Reference Information

CVE: CVE-2013-1170

BID: 59013