Check: RHEL-06-000340
Red Hat Enterprise Linux 6 STIG:
RHEL-06-000340
(in versions v2 r2 through v1 r22)
Title
The snmpd service must use only SNMP protocol version 3 or newer. (Cat II impact)
Discussion
Earlier versions of SNMP are considered insecure, as they potentially allow unauthorized access to detailed system management information.
Check Content
Verify the "snmp" package is installed: # rpm -qa | grep -i snmp net-snmp-5.7.1-31.2.x86_64.rpm If the package is not installed, this is Not Applicable. To ensure only SNMPv3 or newer is used, run the following command: # grep 'v1\|v2c\|com2sec' /etc/snmp/snmpd.conf | grep -v '^#' There should be no output. If there is output, this is a finding.
Fix Text
Edit "/etc/snmp/snmpd.conf", removing any references to "v1", "v2c", or "com2sec". Upon doing that, restart the SNMP service: # service snmpd restart
Additional Identifiers
Rule ID: SV-218071r603264_rule
Vulnerability ID: V-218071
Group Title: SRG-OS-000480
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |