UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The snmpd service must use only SNMP protocol version 3 or newer.


Overview

Finding ID Version Rule ID IA Controls Severity
V-38660 RHEL-06-000340 SV-50461r1_rule Medium
Description
Earlier versions of SNMP are considered insecure, as they potentially allow unauthorized access to detailed system management information.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2016-12-16

Details

Check Text ( C-46215r1_chk )
To ensure only SNMPv3 or newer is used, run the following command:

# grep 'v1\|v2c\|com2sec' /etc/snmp/snmpd.conf | grep -v '^#'

There should be no output.
If there is output, this is a finding.
Fix Text (F-43604r1_fix)
Edit "/etc/snmp/snmpd.conf", removing any references to "v1", "v2c", or "com2sec". Upon doing that, restart the SNMP service:

# service snmpd restart