STIGQter STIGQter: STIG Summary: IBM AIX 7.x Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 25 Apr 2019: If SNMP service is enabled on AIX, the default SNMP password must not be used in the /etc/snmpd.conf config file.

DISA Rule

SV-101681r1_rule

Vulnerability Number

V-91583

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

AIX7-00-001135

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Edit "/etc/snmpd.conf" config file to remove or change all the default passwords that are used in the file.

Restart snmpd:
# stopsrc -s snmpd
# startsrc -s snmpd

Check Contents

Inspect "/etc/snmpd.conf" to find all the passwords that are used in the config file:

# grep -v "^#" /etc/snmpd.conf | grep -E "public|private|password"

If any results are returned, default passwords are being used and this is a finding.

Vulnerability Number

V-91583

Documentable

False

Rule Version

AIX7-00-001135

Severity Override Guidance

Inspect "/etc/snmpd.conf" to find all the passwords that are used in the config file:

# grep -v "^#" /etc/snmpd.conf | grep -E "public|private|password"

If any results are returned, default passwords are being used and this is a finding.

Check Content Reference

M

Target Key

3491

Comments