I had a chance to audit this device during a Wi-Fi pentest. Cisco Prime Network Control System is a Wi-Fi controller that allows to manage multiple access points and centralize their configuration: Wi-Fi settings, access control, security, etc.
I was surprised how easy it was to compromise this equipment, thanks to default credentials. Of course, Cisco published a patch… however how many network teams would have applied the patch ? Routers, switches, Wi-Fi controllers, especially when they are not part of the core infrastructure, are often dropped and forgotten for years…
Here is the vendor advisory, which is about “unspecified” default credentials. With a little of ninja googling, I managed to glue the pieces.
It was not that easy to find the credentials in questions, but the guys from Tenable Security managed to get the info:
wcsdba / wcs123.
Now, you will think, “ok, but we need to find a way to reach the database…’. Piece of cake! By default, the device exposes an Oracle listener on port
Then, we would need to know the Oracle instance… Don’t think too much, don’t even look up at your wordlists, this is just:
Of course, as you should guess now, the account has DBA privileges. :-)
So, in summary:
Oracle listener on port TCP 1522 Instance: WCS Account: wcsdba Password: wcs123 Privileges: DBA
Now you can do pretty much every thing: control network settings, grab and crack password hashes, etc.
Besides, there is also an XSS on a login page…
Well done Cisco, for not hardening anything. :-/