Korean
<< Back
VID 20014
Severity 20
Port 161
Protocol UDP
Class Snmp
Detailed Description It is possible to obtain the operating system type and version of the remote host via SNMP. An attacker may use this information to gain more knowledge about the target host.
Recommendation 1. If SNMP is not required, disable the service.
- UNIX : Kill the snmp process found from the list of the processes and remove it from any RC scripts.
- Solaris 10, Solaris 11:
# svcadm disable svc:/application/management/snmpdx
- Enterprise Linux 6.4, CentOS 6.4, Fedora 19:
# /etc/init.d/snmpd stop
# rpm -e (snmp name)
- Windows : Stop the SNMP service and change Startup type to Disabled (execute services.msc -> Services -> SNMP Service)

2. If you need SNMP for network management, make sure it is properly configured with private community names
- Unix : Configure 'get-community-name' line in /etc/snmpd.conf
- Router : Type 'show config' and make sure 'snmp-community' is properly configured
- Windows : Configure the community name with private one (In windows NT, Control panel -> Services -> SNMP Service -> 'Security' tab, In windows 2000, Administrative tools -> Services -> SNMP Service -> 'Security' tab)

3. Filter incoming traffic to the 161/udp port
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)