cisco-snmp-rce: Cisco IOS SNMP RCE PoC
CVE-2017-6736 / cisco-sa-20170629-snmp Cisco IOS remote code execution
This repository contains Proof-Of-Concept code for exploiting remote code execution vulnerability in SNMP service disclosed by Cisco Systems on June 29th, 2017 – https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp
Image: threatpost
Description
RCE exploit code is available for Cisco Integrated Service Router 2811. This exploit is firmware dependent. The latest firmware version is supported:
- Cisco IOS Software, 2800 Software (C2800NM-ADVENTERPRISEK9-M), Version 15.1(4)M12a, RELEASE SOFTWARE (fc1)
ROM Monitor version:
- System Bootstrap, Version 12.4(13r)T, RELEASE SOFTWARE (fc1)
The read-only community string is required to trigger the vulnerability.
Shellcode
The exploit requires shellcode as HEX input. This repo contains an example shellcode for bypassing authentication in telnet service and in enable prompt. Shellcode to revert changes is also available. If you want to write your own shellcode feel free to do so. Just have two things in mind:
- Don’t upset the watchdog by running your code for too long. Call a sleep function once in a while.
- Return execution flows back to SNMP service at the end. You can use last opcodes from the demo shellcode:
Usage example
Notes
The firmware version can be read via the snmpget command:
Author
Artem Kondratenko https://twitter.com/artkond
Source: https://github.com/artkond/