module

Cisco PVC2300 POE Video Camera configuration download

Disclosed
Jul 12, 2013
Created
Aug 29, 2022

Description

This module exploits an information disclosure vulnerability in Cisco PVC2300 cameras in order
to download the configuration file containing the admin credentials for the web interface.

The module first performs a basic check to see if the target is likely Cisco PVC2300. If so, the
module attempts to obtain a sessionID via an HTTP GET request to the vulnerable /oamp/System.xml
endpoint using hardcoded credentials.

If a session ID is obtained, the module uses it in another HTTP GET request to /oamp/System.xml
with the aim of downloading the configuration file. The configuration file, if obtained, is then
decoded and saved to the loot directory. Finally, the module attempts to extract the admin
credentials to the web interface from the decoded configuration file.

No known solution was made available for this vulnerability and no CVE has been published. It is
therefore likely that most (if not all) Cisco PVC2300 cameras are affected.

This module was successfully tested against several Cisco PVC2300 cameras.

Authors

Craig Heffner
Erik Wynter

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use auxiliary/gather/cisco_pvc2300_download_config
msf auxiliary(cisco_pvc2300_download_config) > show actions
...actions...
msf auxiliary(cisco_pvc2300_download_config) > set ACTION < action-name >
msf auxiliary(cisco_pvc2300_download_config) > show options
...show and set options...
msf auxiliary(cisco_pvc2300_download_config) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.