Rapid7 Vulnerability & Exploit Database

Writeable SNMP default or guessable community names: snmpd

Back to Search

Writeable SNMP default or guessable community names: snmpd



The Simple Network Management Protocol (SNMP) is a commonly used network service. Its primary function is to provide network administrators with information about all kinds of network connected devices. SNMP can be used to get and change system settings on a wide variety of devices, from network servers, to routers and printers. The drawback to this service is the authentication is an unencrypted "community string". In addition many SNMP servers provide very simple default community strings.

The community string "snmpd" was found to have write access to the SNMP server. This is a very serious condition and should be fixed as soon as possible. Attackers with write access to an SNMP server can possibly execute arbitrary commands with root level privilege. Attackers can shutdown machines, stop, start, or change the priority of tasks, and gain valuable information.

The community string "snmpd" may also imply a more serious vulnerability on HP OpenView SNMP servers. This may be a hidden community string. This community allows unauthorized access to certain SNMP variables. Attackers can use this community to discover network topology and modify MIB variables. HP OpenView Version 5.02 is vulnerable. Earlier versions are thought to be vulnerable as well. HP-UX 9.X and HP-UX 10.X SNMP agents are vulnerable if OpenView is installed. OpenView for Solaris 2.X is also vulnerable. OpenView for Windows NT is not vulnerable.


  • snmp-write-0018

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center