Cisco Prime Network Control System Default Credentials (cisco-sa-20130410-ncs)

high Nessus Plugin ID 66861

Synopsis

One or more accounts on the remote host use a default password.

Description

According to its self-reported version, the remote host is running a release of Cisco Prime Network Control System prior to 1.1.2. As such, it reportedly has the following vulnerabilities :

- The 'oracle' user account is secured with an unspecified, default password. (CSCtz30468)

- The 'wcsdba' Oracle database account is secured with a default password of 'wcs123'. (CSCub54624)

A remote, unauthenticated attacker could exploit this to log into the system and change its configuration or disrupt services.

Solution

Upgrade to Cisco Prime Network Control System version 1.1.2 or later.

See Also

http://www.nessus.org/u?e07f1933

Plugin Details

Severity: High

ID: 66861

File Name: cisco-sa-20130410-ncs.nasl

Version: 1.7

Type: local

Family: CISCO

Published: 6/11/2013

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:cisco:prime_network_control_system

Required KB Items: Host/Cisco/Prime_NCS/Version

Exploit Ease: No exploit is required

Patch Publication Date: 4/10/2013

Vulnerability Publication Date: 4/10/2013

Reference Information

CVE: CVE-2013-1170

BID: 59013