Skip to content

Commit 796fe99

Browse files
author
Brent Cook
committed
update docs to note that cluster mode is not necessary to exploit
1 parent 40f0d36 commit 796fe99

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

documentation/modules/auxiliary/dos/cisco/ios_telnet_rocem.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
## Vulnerable Application
22

3-
1. Obtain or target two paired Cisco Catalyst switches of any model indicated here: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp.
4-
2. They will need to be configured in cluster mode. Additional information on setup is available from the module author's site here: https://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/
3+
1. Obtain a Cisco switch of any model indicated here that is running vulnerable firmware: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp. Note that the vulnerability spans many years. We tested two firmwares 10 years apart and were able to verify exploitability.
4+
2. Enable telnet access and verify that you can reach the swith normally via that mode.
55

66
## Verification Steps
77

0 commit comments

Comments
 (0)