GEN005305 - The SNMP service must use only SNMPv3 or its successors.

Information

SNMP Versions 1 and 2 are not considered secure. Without the strong authentication and privacy provided by the SNMP Version 3 User-based Security Model (USM), an attacker or other unauthorized users may gain access to detailed system management information and use the information to launch attacks against the system.

Solution

Edit /etc/snmpd.conf and remove references to the 'v1', 'v2c', 'community', or 'com2sec'.

Restart the SNMP service.
# service snmpd restart

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-17(8), 800-53|CM-7a., CAT|II, CCI|CCI-000381, CCI|CCI-001435, Rule-ID|SV-218579r603259_rule, STIG-ID|GEN005305, STIG-Legacy|SV-63397, STIG-Legacy|V-22447, Vuln-ID|V-218579

Plugin: Unix

Control ID: be9ba635f82af813688213096e4183916955a3a3af8a6f3c4446bfb6b551ddb7