UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The snmpd service must use only SNMP protocol version 3 or newer.


Overview

Finding ID Version Rule ID IA Controls Severity
V-38660 RHEL-06-000340 SV-50461r2_rule Medium
Description
Earlier versions of SNMP are considered insecure, as they potentially allow unauthorized access to detailed system management information.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2019-03-08

Details

Check Text ( C-46215r3_chk )
Verify the "snmp" package is installed:

# rpm -qa | grep -i snmp
net-snmp-5.7.1-31.2.x86_64.rpm

If the package is not installed, this is Not Applicable.

To ensure only SNMPv3 or newer is used, run the following command:

# grep 'v1\|v2c\|com2sec' /etc/snmp/snmpd.conf | grep -v '^#'

There should be no output.

If there is output, this is a finding.
Fix Text (F-43604r1_fix)
Edit "/etc/snmp/snmpd.conf", removing any references to "v1", "v2c", or "com2sec". Upon doing that, restart the SNMP service:

# service snmpd restart