VCSA-70-000265 - The vCenter server must disable SNMPv1/2 receivers.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

SNMPv3 supports commercial-grade security, including authentication, authorization, access control, and privacy. Previous versions of the protocol contained well-known security weaknesses that were easily exploited. Therefore, SNMPv1/2 receivers must be disabled, while SNMPv3 is configured in another control. vCenter exposes SNMP v1/2 in the UI and SNMPv3 in the CLI.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From the vSphere Client, go to Host and Clusters.

Select a vCenter Server >> Configure >> Settings >> General.

Click 'Edit'.

On the 'SNMP receivers' tab, ensure all receivers are disabled.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_7-0_Y23M07_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001967, Rule-ID|SV-256345r885646_rule, STIG-ID|VCSA-70-000265, Vuln-ID|V-256345

Plugin: VMware

Control ID: 60d990481f525b0c33c495fd161eebcf3e1dd5813ebe48fa6eb1d4358d4ddf27