Handler on Duty: Xavier Mertens
Threat Level: green
Thinking...
|
|
||||||||||||||||||||||||||||
| Submitted By | Date |
|---|---|
| Comment | |
| paul_s | 2004-10-28 05:54:15 |
| 10264 Default community names of the SNMP Agent Category: SNMP Risk Level: High Dependencies: None Simple Network Management Protocol (SNMP) is a protocol which can be used by administrators to remotely manage a computer or network device. There are typically 2 modes of remote SNMP monitoring. These modes are roughly 'READ' and 'WRITE' (or PUBLIC and PRIVATE). If an attacker is able to guess a PUBLIC community string, they would be able to read SNMP data (depending on which MIBs are installed) from the remote device. This information might include system time, IP addresses, interfaces, processes running, etc. If an attacker is able to guess a PRIVATE community string (WRITE or 'writeall' access), they will have the ability to change information on the remote machine. This could be a huge security hole, enabling remote attackers to wreak complete havoc such as routing network traffic, initiating processes, etc. In essence, 'writeall' access will give the remote attacker full administrative rights over the remote machine. Risk factor : High More Information: http://www.securiteam.com/exploits/Windows_NT_s_SNMP_service_vulnerability.html | |
| CVE # | Description |
|---|
