/smi_check

Smart Install Client Scanner

Primary LanguagePythonGNU General Public License v2.0GPL-2.0

smi_check

Scans devices and check for Cisco Smart Install client protocol.

Installation

The scan tool depends on python 2.7.

Debian / Ubuntu

$ sudo apt-get install python2.7

The tool works fine within a virtualenv as well.

Usage

the tool sends a crafted probe to your device and determines if you are running Cisco Smart Install.

Reference

Cisco Talos Blog post: http://blog.talosintelligence.com/2017/02/cisco-coverage-for-smart-install-client.html

Cisco PSIRT Blog post: https://blogs.cisco.com/security/cisco-psirt-mitigating-and-detecting-potential-abuse-of-cisco-smart-install-feature

Cisco Security Response: Cisco Smart Install Protocol Misuse : https://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20170214-smi

PSIRT Notification

Cisco Product Security Incident Response Team (PSIRT)

The Cisco Product Security Incident Response Team is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information related to Cisco products and networks. Cisco PSIRT provides security advisories, security responses, and security notices. The PSIRT team is available around the clock to identify possible security issues in Cisco products and networks.

For immediate emergency assistance, contact the 24 hour a day PSIRT dedicated hotline at 877 228-7302 or 408 525-6532. For emergency assistance on this issue via e-mail, contact psirt@cisco.com and reference Cisco Smart Install Misuse.

To receive non-emergency assistance or report suspected security-related issues with Cisco products, contact psirt@cisco.com.

For additional information about Cisco PSIRT's process, please refer to Cisco's Security Vulnerability Policy at: http://www.cisco.com/c/en/us/about/security-center/security-vulnerability-policy.html