STIGQter STIGQter: STIG Summary: IBM AIX 7.x Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 23 Apr 2021:

If SNMP service is enabled on AIX, the default SNMP password must not be used in the /etc/snmpd.conf config file.

DISA Rule

SV-215231r508663_rule

Vulnerability Number

V-215231

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

AIX7-00-001135

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Edit "/etc/snmpd.conf" config file to remove or change all the default passwords that are used in the file.

Restart snmpd:
# stopsrc -s snmpd
# startsrc -s snmpd

Check Contents

Inspect "/etc/snmpd.conf" to find all the passwords that are used in the config file:

# grep -v "^#" /etc/snmpd.conf | grep -E "public|private|password"

If any results are returned, default passwords are being used and this is a finding.

Vulnerability Number

V-215231

Documentable

False

Rule Version

AIX7-00-001135

Severity Override Guidance

Inspect "/etc/snmpd.conf" to find all the passwords that are used in the config file:

# grep -v "^#" /etc/snmpd.conf | grep -E "public|private|password"

If any results are returned, default passwords are being used and this is a finding.

Check Content Reference

M

Target Key

4012

Comments