Update CVE-2017-3881.yaml
parent
0f3d09b753
commit
c3ce5be9c6
|
@ -4,13 +4,10 @@ info:
|
|||
name: Cisco IOS 12.2(55)SE11 Remote Code Execution
|
||||
author: dwisiswant0
|
||||
severity: critical
|
||||
reference: https://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/
|
||||
tags: cve,cve2017,cisco,rce
|
||||
|
||||
# RCE exploit code is available for Cisco Catalyst 2960 switch model. This exploit is firmware dependent.
|
||||
# DoS code is available as a Metasploit module¹. This should work for most of the switches mentioned in the Cisco advisory.
|
||||
|
||||
# ¹ https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/auxiliary/dos/cisco/ios_telnet_rocem.md
|
||||
tags: cve,cve2017,cisco,rce,network
|
||||
reference: |
|
||||
- https://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/
|
||||
- https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/auxiliary/dos/cisco/ios_telnet_rocem.md
|
||||
|
||||
network:
|
||||
- inputs:
|
||||
|
@ -21,6 +18,7 @@ network:
|
|||
host:
|
||||
- "{{Hostname}}:23"
|
||||
read-size: 1024
|
||||
|
||||
matchers:
|
||||
- type: word
|
||||
words:
|
||||
|
|
Loading…
Reference in New Issue