Rapid7 Vulnerability & Exploit Database

Default or Guessable SNMP community names: all private

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

Default or Guessable SNMP community names: all private



The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an unencrypted "community string". In addition many SNMP servers provide very simple default community strings. The community string "all private" is a default on a number of SNMP servers.

This community string can allow attackers to gain a large amount of information about the SNMP server and the network it monitors. Attackers may even reconfigure or shut down devices remotely.

The community name "all private" may also indicate a more serious vulnerability if you are running Solstice Enterprise Agents(SEA) on Solaris.

From bugtraq: The Solstice Enterprise Agents (SEA) enables the creation of custom, extensible agents for device and system management for Solaris. SEA supports both the Simple Network Management Protocol (SNMP) and DMI protocols.

A default community string is present in the Sun SNMP subagent that may be remotely exploited by an unauthorized user to modify system parameters or execute arbitrary commands with root privileges.

SEA was initially available as an unbundled product and later bundled with Solaris 2.6 at version 1.0.1.


  • snmp-read-0021

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center