NET0894 - Network element must only allow SNMP read access - 'SNMP v3 auth'

Information

The network device must only allow SNMP read-only access.

Enabling write access to the device via SNMP provides a mechanism that can be exploited by an attacker to set configuration variables that can disrupt network operations.

Review the network device configuration and verify SNMP community strings are read-only when using SNMPv1, v2c, or basic v3 (no authentication or privacy). Write access may be used if authentication is configured when using SNMPv3. If write-access is used for SNMP versions 1, 2c, or 3 noAuth or Priv mode and there is no documented approval by the IAO, this is a finding.

You will need to manually check the configured views (e.g., read, write) to ensure they only include the desired MIB objects approved for your organization. You may also add an access statement to reference an ACL to further restrict access. Also of note, SNMPv3 users are not shown in a running configuration. You can view them with the show 'snmp user' command to ensure the configured users are assigned to the proper group.

Solution

Configure the network device to allow for read-only SNMP access when using SNMPv1, v2c, or basic v3 (no authentication or privacy). Write access may be used if authentication is configured when using SNMPv3.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Infrastructure_Router_L3_Switch_V8R28_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

References: 800-53|CM-6, 800-53|IA-3, CAT|II, CSCv6|3.1, Rule-ID|SV-30086r3_rule, STIG-ID|NET0894, Vuln-ID|V-3969

Plugin: Cisco

Control ID: 40adc16ce23619b22c50602e456f7c0e09d971aa3f6a09e7e87cd4289c8a4b0b