Vault 7: Projects

This publication series is about specific projects related to the Vault 7 main publication.
SECRET//20350112
1 (U) Introduction
(S) The Cherry Blossom (CB) system provides a means of monitoring the internet
activity of and performing software exploits on targets of interest. In particular, CB is
focused on compromising wireless networking devices, such as wireless routers and
access points (APs), to achieve these goals.
(U) This document discusses Installation, Troubleshooting, Failover, and Recover of CB
Servers.
(U) For a more detailed description of the Cherry Blossom system, see the “Cherry
Blossom User’s Manual”.
2 (U) Related Documents
(U) This document references the following documents:
• Cherry Blossom User’s Manual
• Dell Poweredge 1850 Server Manuals
3 (U) Points of Contact
(S) Here are points of contact for the Cherry Blossom system that can assist with system
configuration, operation, and troubleshooting.
• XXXXX Y – sponsor – COTR
• XXXXX Y – contractor – PM
• XXXXX Y – contractor – Lead Engineer
• XXXXX Y – contractor – Software Engineer
• XXXXX Y – contractor – Software Engineer
• XXXXX Y – contractor for sponsor/network infrastructure expert
SECRET//20350112
4