From eec5d2ada9f5bd80d609c78298ba2bbc79bb74d0 Mon Sep 17 00:00:00 2001 From: Jon Hart Date: Wed, 30 Aug 2017 11:52:11 -0700 Subject: [PATCH] Update description and add link to SIET --- modules/auxiliary/scanner/misc/cisco_smart_install.rb | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/modules/auxiliary/scanner/misc/cisco_smart_install.rb b/modules/auxiliary/scanner/misc/cisco_smart_install.rb index 2f58676df9..e8ab34009b 100644 --- a/modules/auxiliary/scanner/misc/cisco_smart_install.rb +++ b/modules/auxiliary/scanner/misc/cisco_smart_install.rb @@ -15,7 +15,8 @@ class MetasploitModule < Msf::Auxiliary 'Name' => 'Identify Cisco Smart Install endpoints', 'Description' => %q( This module attempts to connect to the specified Cisco Smart Install port - and determines if it speaks the Smart Install Protocol. + and determines if it speaks the Smart Install Protocol. Exposure of SMI + to untrusted networks can allow complete compromise of the switch. ), 'Author' => 'Jon Hart ', 'References' => @@ -23,7 +24,9 @@ class MetasploitModule < Msf::Auxiliary ['URL', 'https://blog.talosintelligence.com/2017/02/cisco-coverage-for-smart-install-client.html'], ['URL', 'https://blogs.cisco.com/security/cisco-psirt-mitigating-and-detecting-potential-abuse-of-cisco-smart-install-feature'], ['URL', 'https://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20170214-smi'], - ['URL', 'https://github.com/Cisco-Talos/smi_check'] + ['URL', 'https://github.com/Cisco-Talos/smi_check'], + ['URL', 'https://github.com/Sab0tag3d/SIET'] + ], 'License' => MSF_LICENSE )