Rapid7 Vulnerability & Exploit Database

Default or Guessable SNMP community names: snmpd

Back to Search

Default or Guessable SNMP community names: snmpd

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
11/02/1998
Created
07/25/2018
Added
11/01/2004
Modified
12/04/2013

Description

The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string "snmpd" is a default on a number of SNMP servers.

This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors. Attackers may even reconfigure or shut down devices remotely.

The community string "snmpd" may also imply a more serious vulnerability on HP OpenView SNMP servers. This may be a hidden community string. This community allows unauthorized access to certain SNMP variables. Attackers can use this community to discover network topology and modify MIB variables. HP OpenView Version 5.02 is vulnerable. Earlier versions are thought to be vulnerable as well. HP-UX 9.X and HP-UX 10.X SNMP agents are vulnerable if OpenView is installed. OpenView for Solaris 2.X is also vulnerable. OpenView for Windows NT is not vulnerable.

Solution(s)

  • snmp-read-0018

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;