The Simple Network Management Protocol (SNMP) is a commonly used
network service. Its primary function is to provide network
administrators with information about all kinds of network connected
devices. SNMP can be used to get and change system settings on a
wide variety of devices, from network servers, to routers and
printers. The drawback to this service is the authentication is an
unencrypted "community string". In addition many SNMP servers
provide very simple default community strings. The community string
"snmpd" is a default on a number of SNMP servers.
This community string can allow attackers to gain a large amount
of information about the SNMP server and the network it monitors.
Attackers may even reconfigure or shut down devices remotely.
The community string "snmpd" may also imply a more serious
vulnerability on HP OpenView SNMP servers. This may be a hidden
community string. This community allows unauthorized access to
certain SNMP variables. Attackers can use this community to
discover network topology and modify MIB variables. HP OpenView
Version 5.02 is vulnerable. Earlier versions are thought to be
vulnerable as well. HP-UX 9.X and HP-UX 10.X SNMP agents are
vulnerable if OpenView is installed. OpenView for Solaris 2.X is
also vulnerable. OpenView for Windows NT is not vulnerable.