1.9.4 Ensure Read Write privileges are not configured for SNMP

Information

SNMP RW (Read-Write) access allows stations with Management access to both read and write SNMP MIB objects.

SNMP is typically used for monitoring specific operational characteristics of the switch. These tasks typically only require read access. Permitting RW (Read-Write) access permits SNMP to modify some SNMP values.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Only use RO groups for SNMPv2. The most common implementation is "network-operator", because if you use the legacy syntax:

switch(config)# snmp-server community <some complex string> ro

the switch will translate this to the new syntax, using "network-operator" group

switch(config)# snmp-server community <some complex string> group network-operator

Impact:

Permitting SNMP RW Access not only allows "write" access to some SNMP MIB Objects, which allows a malicious attacker to modify some operational characterstics of the switch. By extension this access allows a malicious actor to collect the entire configuration of the device.

See Also

https://workbench.cisecurity.org/benchmarks/16139

Item Details

Category: CONFIGURATION MANAGEMENT, MAINTENANCE

References: 800-53|CM-7, 800-53|MA-4, CSCv7|9.2

Plugin: Cisco

Control ID: 3faa2bc04194073b1e369e73352a3c4e39fd0919a14e9d0a4b6ef454340a7e01