CERT Advisory CA-2002-03 describes a series of tests designed to determine the vulnerability of SNMP implementations. Juniper Networks has evaluated its software using the provided test suites, and has determined that, with one exception, the JUNOS Internet software is not vulnerable to any of the potential exploits. The only vulnerability found occurred when SNMP PDU tracing was enabled (snmp traceoptions flag pdu). With this trace flag enabled, certain invalid SNMP varbinds can cause the SNMP process to overflow a buffer and terminate. Although one could theoretically use this buffer overflow to gain root access to the router, no known exploit code exists.
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center