• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Serious security vulnerability in SNMP

spidey07

No Lifer
Keep in mind that you can easily enable SNMP on devices without really knowing it. Everyone should check their machines/servers. Routers/switches are also vulnerable. Heck, seems like most all SNMP agents are affected.

cert advisory
 
I have a cisco 1005 at work. How do I know if I have SNMP enabled, what happens if I turn it off and how do I? I have a T1 into the router, then into an old WhistleWare/IBM Interjet mailserver/firewall into my 5 24 port hubs (I know, I know 5 -24 port 100mbps unmanaged switches going in next week 🙂, then running to my NT4.0 network. All IP's are static, no DHCP is being used.
THANX
 
SNMP is not enabled by default on cisco routers (that I know of). In the link above there is another link to cisco's incidet page.

look for commands in your config like...
snmp community public ro
snmp community private rw

I think you also check with the "show snmp" command
 
Yep, did the show snmp one before and said: % snmp not enabled. I would imagine this means I am safe correct?
 
Haven't seen any here, but we have to scan our whole network, just in case. As a reminder to anyone scanning their network, remember that SNMP can run of TCP or UDP, so you have to scan both when running through the ports.

RagManX
 
Back
Top