| VID |
20003 |
| Severity |
20 |
| Port |
161 |
| Protocol |
UDP |
| Class |
Snmp |
| Detailed Description |
It was possible to obtain the list of network interfaces of the host via SNMP. An attacker may use this information to gain more knowledge about the target host.
* References: http://www.iss.net/security_center/static/1795.php http://www.cisco.com/warp/public/535/3.html |
| Recommendation |
1. If SNMP is not required, disable the service. - UNIX : Kill the snmp process found from the process list and remove it from any RC scripts. - Solaris 10, Solaris 11: # svcadm disable svc:/application/management/snmpdx - Enterprise Linux 6.4, CentOS 6.4, Fedora 19: # /etc/init.d/snmpd stop # rpm -e (snmp name) - Windows : Stop the SNMP service and change Startup type to Disabled (Execute services.msc -> Services -> SNMP Service)
2. If you need SNMP for network management, make sure it is properly configured with secure community names - Unix : Configure 'get-community-name' line in /etc/snmpd.conf - Router : Type 'show config' and make sure 'snmp-community' is properly configured - Windows : Configure the community name with secure one (IExecute services.msc -> Services -> SNMP Service -> 'Security' tab)
3. Filter incoming traffic to the 161/udp port. If the agent supports View Access Control, limit the views that the agent may reveal. |
| Related URL |
(CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|