{"uuid": "f520260d-43f3-499d-a154-8b4e62ed00e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CISCO-SA-20170317-CMP", "type": "published-proof-of-concept", "source": "https://t.me/SHATOOB/1435", "content": "\ud83c\udd94 @SHATOOB\n\n\n  \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u062f\u0631  Cisco Cluster Management Protocol  \u06cc\u0627 CMP  \u0628\u0633\u06cc\u0627\u0631\u06cc \u0627\u0632  \u0633\u0648\u0626\u06cc\u0686 \u0647\u0627\u06cc  Cisco Catalyst \u0647\u0627 \u0631\u0627 \u062f\u0631 \u0645\u0639\u0631\u0636 \u062e\u0637\u0631 \u0642\u0631\u0627\u0631 \u062f\u0627\u062f\u0647 \u0627\u0633\u062a .\n\n\ud83d\udd39\u0627\u06af\u0631 \u0647\u0645\u0686\u0646\u0627\u0646 \u0628\u0631\u0627\u06cc \u0627\u062a\u0635\u0627\u0644 \u0628\u0647 \u0633\u0648\u0626\u06cc\u0686 \u0647\u0627\u06cc  Cisco \u062f\u0631 \u0634\u0628\u06a9\u0647 \u062e\u0648\u062f \u0627\u0632  Telnet \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc \u06a9\u0646\u06cc\u062f \u0648 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0633\u0648\u0626\u06cc\u0686 \u0647\u0627\u06cc \u062e\u0648\u062f \u0631\u0627 \u0645\u062d\u062f\u0648\u062f \u0646\u06a9\u0631\u062f\u0647 \u0627\u06cc\u062f \u0628\u0627\u06cc\u062f \u0646\u06af\u0631\u0627\u0646 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0628\u0627\u0634\u06cc\u062f. \u06a9\u0627\u0641\u06cc \u0627\u0633\u062a \u0645\u0647\u0627\u062c\u0645 \u0628\u0647 \u0646\u0642\u0637\u0647 \u0627\u06cc \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0634\u0645\u0627 \u0645\u062a\u0635\u0644 \u0634\u0648\u062f \u0648 \u0628\u062a\u0648\u0627\u0646\u062f \u0627\u0632 \u0637\u0631\u06cc\u0642 Telnet \u0628\u0647 \u0633\u0648\u0626\u06cc\u0686 \u0647\u0627\u06cc \u0634\u0645\u0627 \u0645\u062a\u0635\u0644 \u0634\u0648\u062f .\n\n\ud83d\udd39\u0645\u0646\u0634\u0623 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0646\u0642\u0635 \u062f\u0631 \u06a9\u062f( Cisco Cluster Management Protocol (CMP \u062f\u0631 Cisco IOS \u0648 Cisco IOS XE \u0630\u06a9\u0631 \u0634\u062f\u0647 \u0627\u0633\u062a .\n\n\u0634\u0627\u06cc\u0627\u0646 \u0630\u06a9\u0631 \u0627\u0633\u062a \u0627\u0632 \u0627\u0646\u062a\u0634\u0627\u0631 \u0627\u0648\u0644\u06cc\u0647 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u062d\u062f\u0648\u062f \u06cc\u06a9 \u0645\u0627\u0647 \u0645\u06cc \u06af\u0630\u0631\u062f \u0648\u0644\u06cc \u0628\u0647 \u062c\u0647\u062a \u0627\u0647\u0645\u06cc\u062a \u0648 \u0634\u062f\u062a \u0628\u0627\u0644\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc  \u0648 \u0647\u0645\u0686\u0646\u06cc\u0646 \u0627\u0646\u062a\u0634\u0627\u0631 POC \u0645\u0631\u0628\u0648\u0637\u0647 \u060c \u0628\u0647 \u0622\u0646 \u0627\u0634\u0627\u0631\u0647 \u06af\u0631\u062f\u06cc\u062f .\n\n\ud83d\udd38\u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0628\u0627 \u0627\u0631\u0633\u0627\u0644 \u0646\u0627\u0642\u0635 \u06af\u0632\u06cc\u0646\u0647 \u0647\u0627\u06cc \u062e\u0627\u0635 Telnet \u06a9\u0647 \u0628\u0631\u0627\u06ccCisco Cluster Management Protocol  \u0628\u0647 \u06a9\u0627\u0631 \u0645\u06cc \u0631\u0648\u062f\u060c \u0628\u0647 \u06cc\u06a9 \u062f\u0633\u062a\u06af\u0627\u0647 Cisco \u0645\u062a\u0635\u0644 \u0634\u0648\u062f .\n\n\ud83d\udd39\u0628\u0627 \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u0647\u0627\u062c\u0645 \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u062e\u0648\u062f \u0631\u0627 \u0627\u062c\u0631\u0627 \u06a9\u0646\u062f\u060c \u06a9\u0646\u062a\u0631\u0644 \u06a9\u0627\u0645\u0644 \u062f\u0633\u062a\u06af\u0627\u0647 \u0631\u0627 \u062f\u0631 \u0627\u062e\u062a\u06cc\u0627\u0631 \u0628\u06af\u06cc\u0631\u062f \u06cc\u0627 \u0622\u0646 \u0631\u0627 reload \u06a9\u0646\u062f .\n\n\ud83d\udd39\u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0628\u0633\u06cc\u0627\u0631\u06cc \u0627\u0632 \u062a\u062c\u0647\u06cc\u0632\u0627\u062a Catalyst \u0634\u0631\u06a9\u062a Cisco \u0631\u0627 \u062a\u062d\u062a \u062a\u0623\u062b\u06cc\u0631 \u0642\u0631\u0627\u0631 \u0645\u06cc \u062f\u0647\u062f  \u06a9\u0647 \u0628\u0631\u062e\u06cc \u0627\u0632 \u0622\u0646\u0647\u0627 \u0639\u0628\u0627\u0631\u062a\u0646\u062f \u0627\u0632 : \n\n\u2022  \u0627\u0646\u0648\u0627\u0639 \u0645\u062e\u062a\u0644\u0641\u06cc \u0627\u0632 Cisco Catalyst 2960 \u0634\u0627\u0645\u0644 2960L\u060c 2960S\u060c 2960X\u060c 2960XR\n\u2022 \u0627\u0646\u0648\u0627\u0639 \u0645\u062e\u062a\u0644\u0641\u06cc \u0627\u0632 Cisco Catalyst 3560 \u0634\u0627\u0645\u0644 3560C\u060c 3560CX\u060c 3560E\u060c 3560G\u060c3560V2\u060c 3560X\n\u2022  \u0627\u0646\u0648\u0627\u0639 \u0645\u062e\u062a\u0644\u0641\u06cc \u0627\u0632 Cisco Catalyst 3750 \u0627\u0632 \u062c\u0645\u0644\u0647 3750E\u060c 3750G\u060c 3750V2\u060c 3750X\n\u2022  \u0627\u0646\u0648\u0627\u0639 \u0645\u062e\u062a\u0644\u0641\u06cc \u0627\u0632 Cisco Catalyst 4500 Supervisor Engine   \u0627\u0632 \u062c\u0645\u0644\u0647 II-Plus \u060cII-Plus-TS \u060cV-10GE \u060cII-Plus-10GE \u060c6-E \u060c6L-E\n\u2022 \u0628\u0631\u062e\u06cc \u0627\u0632 \u0627\u0646\u0648\u0627\u0639 Cisco Catalyst 4948\n\u2022  \u0628\u0631\u062e\u06cc \u0627\u0632 \u0627\u0646\u0648\u0627\u0639 Cisco IE 2000\u060c Cisco IE 3000\u060c Cisco IE 4000\n\u2022  \u0648 ...\n\n\ud83d\udd38 \u0634\u0631\u06a9\u062a Cisco \u0627\u0639\u0644\u0627\u0645 \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a \u0628\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0645\u0631\u062a\u0628\u0637 \u0631\u0627 \u0628\u0647 \u0632\u0648\u062f\u06cc \u0645\u0646\u062a\u0634\u0631 \u062e\u0648\u0627\u0647\u062f \u06a9\u0631\u062f .\n\n\ud83d\udd39 \u0647\u0645\u0686\u0646\u06cc\u0646 Proof Of Concept \u06cc\u0627  POC \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc  \u0646\u06cc\u0632 \u062f\u0631 \u062f\u0633\u062a\u0631\u0633 \u0642\u0631\u0627\u0631 \u06af\u0631\u0641\u062a \u0648  \u0627\u0634\u0627\u0631\u0647 \u0645\u06cc \u06a9\u0646\u062f  \u06a9\u0647 \u062f\u0631 \u0627\u0633\u0646\u0627\u062f  Vault 7 \u0645\u0646\u062a\u0634\u0631 \u0634\u062f\u0647 \u0627\u0632 \u0633\u0648\u06cc  WikiLeaks \u060c \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc  ROCEM \u0646\u0627\u0645\u06cc\u062f\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a .\n\n\n\ud83d\udd39\u0628\u0631\u0627\u06cc \u0645\u0637\u0627\u0644\u0639\u0647 \u0648 \u0628\u0631\u0631\u0633\u06cc \u062f\u0642\u06cc\u0642 \u062a\u0631 \u0628\u0647 \u0645\u0646\u0627\u0628\u0639 \u0627\u0635\u0644\u06cc \u0645\u0631\u0627\u062c\u0639\u0647 \u0641\u0631\u0645\u0627\u06cc\u06cc\u062f .\n\n\u0645\u0646\u0628\u0639 :\n\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp\nhttps://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/\nhttps://github.com/artkond/cisco-rce\n\n\u269c\ufe0f\u269c\ufe0f  \u0634\u0627\u062a\u0648\u0628 \u062f\u0631\u06cc\u0686\u0647 \u0627\u06cc \u0628\u0647 \u062f\u0646\u06cc\u0627\u06cc \u0631\u0627\u06cc\u0627\u0646\u0647 \u269c\ufe0f\u269c\ufe0f\n\n\ud83c\udd94 @SHATOOB", "creation_timestamp": "2017-04-14T03:07:14.000000Z"}