UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The default passwords and SNMP community strings of all management services have not been replaced with complex passwords.


Overview

Finding ID Version Rule ID IA Controls Severity
V-6781 MFD02.001 SV-7003r2_rule High
Description
There are many known vulnerabilities in the SNMP protocol and if the default community strings and passwords are not modified an unauthorized individual could gain control of the MFD or printer. This could lead to a denial of service or the compromise of sensitive data. The SA will ensure the default passwords and SNMP community strings of all management services are replaced with complex passwords.
STIG Date
Multifunction Device and Network Printers STIG 2019-10-07

Details

Check Text ( C-2966r2_chk )
The reviewer will, with assistance from the SA, verify the default passwords and SNMP community strings of all management services have been replaced with complex passwords.
Fix Text (F-6434r1_fix)
Develop a plan to coordinate the modification of the default passwords and SNMP community strings of all management services replacing them with complex passwords. Obtain CM approval of the plan and execute the plan.