10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
7.2 High
AI Score
Confidence
High
0.454 Medium
EPSS
Percentile
97.4%
Simple Network Management Protocol (SNMP) is a protocol which
can be used by administrators to remotely manage a computer or network device. There are typically
2 modes of remote SNMP monitoring. These modes are roughly
# SPDX-FileCopyrightText: 2014 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.10264");
# nb:
# - Unlike other VTs we're using the CVEs line by line here for easier addition of new CVEs / to
# avoid too large diffs
# - Some of the CVEs are about access with/via ro (read only) with a score of 7.5 while others are
# for rw access (read write) with a score of 10.0. As we can't differentiate between both we use
# the lower score here.
script_cve_id("CVE-1999-0186",
"CVE-1999-0254",
"CVE-1999-0472",
"CVE-1999-0516",
"CVE-1999-0517",
"CVE-1999-0792",
"CVE-2000-0147",
"CVE-2001-0380",
"CVE-2001-0514",
"CVE-2001-1210",
"CVE-2002-0109",
"CVE-2002-0478",
"CVE-2002-1229",
"CVE-2004-0311",
"CVE-2004-1474",
"CVE-2004-1775",
"CVE-2004-1776",
"CVE-2006-4950",
"CVE-2010-1574",
"CVE-2010-2976",
"CVE-2011-0890",
"CVE-2012-4964",
"CVE-2014-4862",
"CVE-2014-4863",
"CVE-2016-1452",
"CVE-2016-1473",
"CVE-2016-5645",
"CVE-2017-7922",
"CVE-2020-5364",
"CVE-2024-5460"); # Brocade Fabric OS
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/11237");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/177");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/20125");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/2112");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/2896");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/3758");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/3795");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/3797");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/41436");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/4330");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46981");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/5030");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/5965");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/7081");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/7212");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/7317");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/91756");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/92428");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/9681");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/973");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/986");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/99083");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_version("2024-06-04T05:05:28+0000");
script_name("Report default community names of the SNMP Agent");
script_tag(name:"last_modification", value:"2024-06-04 05:05:28 +0000 (Tue, 04 Jun 2024)");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2019-10-09 23:29:00 +0000 (Wed, 09 Oct 2019)");
script_tag(name:"creation_date", value:"2014-03-12 10:10:24 +0100 (Wed, 12 Mar 2014)");
script_category(ACT_GATHER_INFO);
script_family("SNMP");
script_copyright("Copyright (C) 2014 Greenbone AG");
script_dependencies("snmp_detect.nasl");
script_require_udp_ports("Services/udp/snmp", 161);
script_mandatory_keys("SNMP/v12c/detected_community");
script_tag(name:"impact", value:"If an attacker is able to guess a PUBLIC community string, they
would be able to read SNMP data (depending on which MIBs are installed) from the remote device.
This information might include system time, IP addresses, interfaces, processes running, etc.
If an attacker is able to guess a PRIVATE community string (WRITE or 'writeall' access), they will
have the ability to change information on the remote machine. This could be a huge security hole,
enabling remote attackers to wreak complete havoc such as routing network traffic, initiating
processes, etc. In essence, 'writeall' access will give the remote attacker full administrative
rights over the remote machine.
Note that this test only gathers information and does not attempt to write to the remote device.
Thus it is not possible to determine automatically whether the reported community is public or
private.
Also note that information made available through a guessable community string might or might not
contain sensitive data. Please review the information available through the reported community
string to determine the impact of this disclosure.");
script_tag(name:"solution", value:"Determine if the detected community string is a private
community string. Determine whether a public community string exposes sensitive information.
Disable the SNMP service if you don't use it or change the default community string.");
script_tag(name:"summary", value:"Simple Network Management Protocol (SNMP) is a protocol which
can be used by administrators to remotely manage a computer or network device. There are typically
2 modes of remote SNMP monitoring. These modes are roughly 'READ' and 'WRITE' (or PUBLIC and
PRIVATE).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"remote_vul");
exit(0);
}
include("snmp_func.inc");
port = snmp_get_port( default:161 );
cos = make_list( get_kb_list( "SNMP/" + port + "/v12c/detected_community" ) );
if( ! cos )
exit( 99 );
# If snmp_default_communities.nasl is detecting more than four different communities there might be something wrong...
if( get_kb_item( "SNMP/" + port + "/v12c/all_communities" ) )
exit( 0 );
report = 'SNMP Agent responded as expected when using the following community name:\n\n';
# Sort to not report changes on delta reports if just the order is different
cos = sort( cos );
foreach co( cos ) {
report += co + '\n';
vuln = TRUE;
}
if( vuln ) {
security_message( port:port, data:report, proto:"udp" );
exit( 0 );
}
exit( 99 );
www.securityfocus.com/bid/11237
www.securityfocus.com/bid/177
www.securityfocus.com/bid/20125
www.securityfocus.com/bid/2112
www.securityfocus.com/bid/2896
www.securityfocus.com/bid/3758
www.securityfocus.com/bid/3795
www.securityfocus.com/bid/3797
www.securityfocus.com/bid/41436
www.securityfocus.com/bid/4330
www.securityfocus.com/bid/46981
www.securityfocus.com/bid/5030
www.securityfocus.com/bid/5965
www.securityfocus.com/bid/7081
www.securityfocus.com/bid/7212
www.securityfocus.com/bid/7317
www.securityfocus.com/bid/91756
www.securityfocus.com/bid/92428
www.securityfocus.com/bid/9681
www.securityfocus.com/bid/973
www.securityfocus.com/bid/986
www.securityfocus.com/bid/99083
10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
7.2 High
AI Score
Confidence
High
0.454 Medium
EPSS
Percentile
97.4%