RHEL-06-000340 - The snmpd service must use only SNMP protocol version 3 or newer.

Information

Earlier versions of SNMP are considered insecure, as they potentially allow unauthorized access to detailed system management information.

Solution

Edit '/etc/snmp/snmpd.conf', removing any references to 'v1', 'v2c', or 'com2sec'. Upon doing that, restart the SNMP service:

# service snmpd restart

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_6_V2R2_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-218071r603264_rule, STIG-ID|RHEL-06-000340, STIG-Legacy|SV-50461, STIG-Legacy|V-38660, Vuln-ID|V-218071

Plugin: Unix

Control ID: f4126af4ed53895bcc76a1536b57571107433669ba9213ca9e7b1042f85bc0b5