GEN:SID | 1:1415 |
Message | SNMP Broadcast request |
Summary | This event is generated when an SNMP-Trap connection over UDP to a broadcast address is made.
|
Impact | Information gathering
|
Detailed Information | The SNMP (Simple Network Management Protocol) Trap daemon usually listens on port 161, tcp or udp.
An attacker may attempt to send this request to determine if any devices are using SNMP.
|
Affected Systems | Devices running SNMP Trap daemons on well known ports.
|
Attack Scenarios | An attacker sends a packet directed to udp port 161, if sucessful a reply is generated and the attacker may then launch further attacks against the SNMP daemon on the responding IP addresses.
|
Ease of Attack | Simple.
|
Corrective Action | Use a packet filtering firewall to protect devices using the SNMP protocol and only allow connections from well-known hosts.
|
Additional References | CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0013 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0012
|
Rule References | bugtraq: 4088
bugtraq: 4089
bugtraq: 4132
cve: 2002-0012
cve: 2002-0013
|