One of our tech’s working in another city had a client with an auditor’s penetration test report indicating their SNMP was accessible on the internet from three different servers. They wanted to know if that was a bad thing and if it is bad, how they can test for it to confirm the auditors findings and then stop it. Here are the answers.
SNMP, or Simple Network Management Protocol, is a protocol used mostly for monitoring network devices such as routers, switches, servers, UPS’s, printers, and more. I can also be used to do very basic remote management of those devices. It allows network administrators to gather information about network performance, detect network faults, and configure network devices.
Uncessesary SNMP Details You MIGHT Care About:
Not unless you like getting hacked or you have some very unusual configuration with some very tight firewall rules to allow only some destinations to access your SNMP.
Simple Network Management Protocol is inherently insecure because its messages are not encrypted, making it vulnerable to various types of attacks. Allowing SNMP traffic to be accessible from the internet can expose your network to potential threats, such as unauthorized access to network information and management capabilities.
To enhance security, it is recommended to block SNMP traffic at your firewall and only allow it within your internal network. This helps prevent malicious actors from exploiting SNMP vulnerabilities and gaining access to sensitive information.
It is very easy to tell if SNMP is exposed on the Internet. You just need to download free port scanner and try to connect.
portqry.exe -n [YourDomainOrIPAddress] -p udp -e 161
If the port is open, you should see a message indicating that the port is listening. If the port is closed, you will see a message indicating that the port is not listening.
This website uses cookies.