27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Monitor Community String<br />

<strong>PVS</strong> ID: 1359 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - monitor<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Agent Community String<br />

<strong>PVS</strong> ID: 1360 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - agent<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Agent Community String<br />

<strong>PVS</strong> ID: 1361 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - agent<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks though, your community<br />

string is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP Manager Community String<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1362 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 349

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!