diff --git a/modules/auxiliary/scanner/misc/cisco_smart_install.rb b/modules/auxiliary/scanner/misc/cisco_smart_install.rb index 2f58676df9..e8ab34009b 100644 --- a/modules/auxiliary/scanner/misc/cisco_smart_install.rb +++ b/modules/auxiliary/scanner/misc/cisco_smart_install.rb @@ -15,7 +15,8 @@ class MetasploitModule < Msf::Auxiliary 'Name' => 'Identify Cisco Smart Install endpoints', 'Description' => %q( This module attempts to connect to the specified Cisco Smart Install port - and determines if it speaks the Smart Install Protocol. + and determines if it speaks the Smart Install Protocol. Exposure of SMI + to untrusted networks can allow complete compromise of the switch. ), 'Author' => 'Jon Hart ', 'References' => @@ -23,7 +24,9 @@ class MetasploitModule < Msf::Auxiliary ['URL', 'https://blog.talosintelligence.com/2017/02/cisco-coverage-for-smart-install-client.html'], ['URL', 'https://blogs.cisco.com/security/cisco-psirt-mitigating-and-detecting-potential-abuse-of-cisco-smart-install-feature'], ['URL', 'https://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20170214-smi'], - ['URL', 'https://github.com/Cisco-Talos/smi_check'] + ['URL', 'https://github.com/Cisco-Talos/smi_check'], + ['URL', 'https://github.com/Sab0tag3d/SIET'] + ], 'License' => MSF_LICENSE )