Rapid7 Vulnerability & Exploit Database

Default or Guessable SNMP community names: private

Back to Search

Default or Guessable SNMP community names: private

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
02/08/2000
Created
07/25/2018
Added
11/01/2004
Modified
11/10/2016

Description

The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string "private" is a default on a number of SNMP servers.

This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors. Attackers may even reconfigure or shut down devices remotely.

This string is a known default community string on SCO Open Server 5.0.5. If you use this system, please see the specific solution below.

Solution(s)

  • snmp-read-0002
  • secure-cisco-ios-snmp-installation

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;