documentation/modules/auxiliary/scanner/vxworks/urgent11_check.md
This detects systems running vulnerable versions of the Interpeak IPnet TCP/IP stack, which may be exploitable due to bugs parsing malformed network packets which can lead to memory corruption or denial-of-service attack possibilities.
use auxiliary/scanner/vxworks/urgent11_checkset [RHOSTS], replacing [RHOSTS] with a list of hosts to test for the presence of the vulnerable IP stack.set [RPORTS], replacing [RPORTS] with a list of possible service ports to interrogate for vulnerable stack behavior.runmsf auxiliary(scanner/vxworks/urgent11_check) > set RHOSTS 192.168.86.1 192.168.86.2
RHOSTS => 192.168.86.1 192.168.86.2
msf auxiliary(scanner/vxworks/urgent11_check) > set THREADS 2
THREADS => 2
msf auxiliary(scanner/vxworks/urgent11_check) > set RPORTS 21 22 23 80 443
RPORTS => 21 22 23 80 443
msf auxiliary(scanner/vxworks/urgent11_check) > run
[*] 192.168.86.1:21 being checked
[*] 192.168.86.2:21 being checked
[*] 192.168.86.1:22 being checked
[*] 192.168.86.1:23 being checked
[*] 192.168.86.1:80 being checked
[*] 192.168.86.1:443 being checked
[*] Scanned 1 of 2 hosts (50% complete)
[*] 192.168.86.2:22 being checked
[+] 192.168.86.2:22 affected by CVE-2019-12258
[*] 192.168.86.2:23 being checked
[*] 192.168.86.2:80 being checked
[*] 192.168.86.2:443 being checked
[+] 192.168.86.2:443 affected by CVE-2019-12258
[*] Scanned 2 of 2 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(scanner/vxworks/urgent11_check) >