STIGQter STIGQter: STIG Summary: Solaris 10 X86 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 22 Jan 2021:

SNMP communities, users, and passphrases must be changed from the default.

DISA Rule

SV-227876r603266_rule

Vulnerability Number

V-227876

Group Title

SRG-OS-000480

Rule Version

GEN005300

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Change the default passwords. To change them, locate the snmpd.conf file and edit it. Locate the line system-group-read-community which has a default password of public and make the password something more random (less guessable). Make the same changes for the lines that read system-group-write-community, read-community, write-community, trap, and trap-community. Read the information in the file carefully. The trap is defining who to send traps to, for instance, by default. It is not a password, but the name of a host.

Check Contents

Check the SNMP configuration for default passwords.

Locate and examine the SNMP configuration.
Procedure:
# more /etc/sma/snmp/snmpd.conf /var/sma_snmp/snmpd.conf /etc/snmp/conf/snmpd.conf /usr/sfw/lib/sma_snmp/snmpd.conf

Identify any community names or user password configuration. If any community name or password is set to a default value, such as public, private, snmp-trap, or password, this is a finding.

Vulnerability Number

V-227876

Documentable

False

Rule Version

GEN005300

Severity Override Guidance

Check the SNMP configuration for default passwords.

Locate and examine the SNMP configuration.
Procedure:
# more /etc/sma/snmp/snmpd.conf /var/sma_snmp/snmpd.conf /etc/snmp/conf/snmpd.conf /usr/sfw/lib/sma_snmp/snmpd.conf

Identify any community names or user password configuration. If any community name or password is set to a default value, such as public, private, snmp-trap, or password, this is a finding.

Check Content Reference

M

Target Key

4061

Comments