Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/auxiliary/dos/cisco/cisco_7937g_dos.md
Views: 11788
Vulnerable Application
Cisco 7937G Conference Station. This module has been tested successfully against firmware versions SCCP-1-4-5-5 and SCCP-1-4-5-7.
Description
This module exploits a bug in how the conference station handles incoming SSH connections that provide an incompatible key exchange. By connecting with an incompatible key exchange, the device becomes nonresponsive until it is manually power cycled.
Verification Steps
Obtain a Cisco 7937G Conference Station.
Enable SSH Access on the device.
Start msfconsole
Do:
use auxiliary/dos/cisco/cisco_7937G_dos
Do:
set RHOST 192.168.1.10
Do:
run
The conference station should now be nonresponsive until it is power cycled
Options
No options