UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The snmpd service must use only SNMP protocol version 3 or newer.


Overview

Finding ID Version Rule ID IA Controls Severity
V-50717 OL6-00-000340 SV-64923r1_rule Medium
Description
Earlier versions of SNMP are considered insecure, as they potentially allow unauthorized access to detailed system management information.
STIG Date
Oracle Linux 6 Security Technical Implementation Guide 2019-10-01

Details

Check Text ( C-53203r1_chk )
To ensure only SNMPv3 or newer is used, run the following command:

# grep 'v1\|v2c\|com2sec' /etc/snmp/snmpd.conf | grep -v '^#'

There should be no output.
If there is output, this is a finding.
Fix Text (F-55513r1_fix)
Edit "/etc/snmp/snmpd.conf", removing any references to "v1", "v2c", or "com2sec". Upon doing that, restart the SNMP service:

# service snmpd restart