UCF STIG Viewer Logo

The snmpd service must use only SNMP protocol version 3 or newer.


Overview

Finding ID Version Rule ID IA Controls Severity
V-218071 RHEL-06-000340 SV-218071r505923_rule Medium
Description
Earlier versions of SNMP are considered insecure, as they potentially allow unauthorized access to detailed system management information.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2020-09-03

Details

Check Text ( C-19552r462415_chk )
Verify the "snmp" package is installed:

# rpm -qa | grep -i snmp
net-snmp-5.7.1-31.2.x86_64.rpm

If the package is not installed, this is Not Applicable.

To ensure only SNMPv3 or newer is used, run the following command:

# grep 'v1\|v2c\|com2sec' /etc/snmp/snmpd.conf | grep -v '^#'

There should be no output.

If there is output, this is a finding.
Fix Text (F-19550r462416_fix)
Edit "/etc/snmp/snmpd.conf", removing any references to "v1", "v2c", or "com2sec". Upon doing that, restart the SNMP service:

# service snmpd restart