Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-3881 PoC — 多款Cisco产品IOS和IOS XE Software 输入验证错误漏洞

Source
Associated Vulnerability
Title:多款Cisco产品IOS和IOS XE Software 输入验证错误漏洞 (CVE-2017-3881)
Description:Cisco Catalyst Switches等都是美国思科(Cisco)公司的交换机产品。Cisco IOS和IOS XE都是运行于其中的操作系统。 多款Cisco产品中的IOS和IOS XE Software的Cluster Management Protocol (CMP)处理代码存在远程代码执行漏洞。远程攻击者可利用该漏洞造成受影响设备重载,或以提升的权限执行代码。以下设备受到影响:Cisco Catalyst switches;Embedded Service 2020 switches;Enh
Readme
# CVE-2017-3881 Cisco Catalyst RCE Proof-Of-Concept
 Apr 10, 2017

Do you still have telnet enabled on your Catalyst switches? Think twice, here’s a proof-of-concept remote code execution exploit for Catalyst 2960 switch with latest suggested firmware. Check out the exploit code here. What follows is a detailed write-up of the exploit development process for the vulnerability leaked from CIA’s archive on March 7th 2017 and publicly disclosed by Cisco Systems on March 17th 2017. At the time of writing this post there is no patch available. Nonetheless there is a remediation - disable telnet and use SSH instead.
# Vault 7 CIA leak
A series of CIA’s documents were leaked on March 7th 2017 and published on WikiLeaks. Among other publications there was an interesting preauth code execution vulnerability that affected multiple Cisco switches. This vulnerability is code-named ROCEM in the leaked documents. Although very few technical details were mentioned, few things stand out.

The Vault 7’s documents shed a light on the testing process for the actual exploit. No exploit source code is available in the leak. Two use cases are highlighted there - the tool can be launched in either interactive mode or set mode. The interactive mode sends the payload via telnet and immediately presents the attacker with command shell in the context of the same telnet connection. Quote from the doc:
File Snapshot

[4.0K] /data/pocs/2490eb1f01f0001d51693da468deeb9c387069bf ├── [3.3K] CVE-2017-3881.py └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.