Vault 7: Projects

This publication series is about specific projects related to the Vault 7 main publication.
1 (U) Introduction
(S) The Cherry Blossom (CB) system provides a means of monitoring the internet
activity of and performing software exploits on targets of interest. In particular, CB is
focused on compromising wireless networking devices, such as wireless (802.11) routers
and access points (APs), to achieve these goals
1
.
(U) This Quick Start Guide gives a brief overview of the CB system, including basic
system description and operation. For complete documentation on system description and
operation, see the “Cherry Blossom User’s Manual” (CBUM).
2 (U) Related Documents
(U) This document references the following documents:
• Cherry Blossom User’s Manual (CBUM)
• Cherry Blossom Server Installation, Troubleshooting, Failover, and Recovery
Guide (commonly referred to as the “Cherry Blossom Installation Guide”)
• WiFi Devices.xls
3 (U) Points of Contact
(U) See the Cherry Blossom Installation Guide for points of contact for the Cherry
Blossom system who can assist with system configuration, operation, and
troubleshooting.
1
(S) The CB architecture does not limit itself to wireless devices – in general, wired network devices (e.g.,
routers, gateways) can be compromised in a similar fashion to achieve the same goals.
4