@@ -11,17 +11,18 @@ class Metasploit3 < Msf::Auxiliary
11
11
12
12
def initialize ( info = { } )
13
13
super ( update_info ( info ,
14
- 'Name' => 'Telisca IPS Lock Control' ,
14
+ 'Name' => 'Telisca IPS Lock Cisco IP Phone Control' ,
15
15
'Description' => %q{
16
- This modules will exploit the vulnerabilities of Telisca IPSLock in order to lock or unlock
17
- IP Phones. You need to be in the voip vlan and you have to know the phone name.
18
- Example : SEP002497AB1D4B.
16
+ This module allows an unauthenticated attacker to exercise the
17
+ "Lock" and "Unlock" functionality of Telisca IPS Lock for Cisco IP
18
+ Phones. This module should be run in the VoIP VLAN, and requires
19
+ knowledge of the target phone's name (for example, SEP002497AB1D4B).
19
20
20
21
Set ACTION to either LOCK or UNLOCK. UNLOCK is the default.
21
22
} ,
22
23
'References' =>
23
24
[
24
- # First publicly known resource
25
+ # Publicly disclosed via Metaploit PR
25
26
'URL' , 'https://github.com/rapid7/metasploit-framework/pull/6470'
26
27
] ,
27
28
'Author' =>
@@ -42,10 +43,9 @@ def initialize(info = {})
42
43
register_options (
43
44
[
44
45
OptAddress . new ( 'RHOST' , [ true , 'The IPS Lock IP Address' ] ) ,
45
- OptString . new ( 'PHONENAME' , [ true , 'The name of the victim phone. Ex: SEP002497AB1D4B ' ] )
46
+ OptString . new ( 'PHONENAME' , [ true , 'The name of the target phone' ] )
46
47
] , self . class )
47
48
48
- deregister_options ( 'RHOSTS' )
49
49
end
50
50
51
51
def print_status ( msg = '' )
0 commit comments