STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 6 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Solaris 11 SPARC Security Technical Implementation Guide

V-216456

CAT I (High)

SNMP default community strings and passphrases must be changed from vendor defaults.

Rule ID

SV-216456r1190826_rule

STIG

Solaris 11 SPARC Security Technical Implementation Guide

Version

V3R5

CCIs

CCI-000366

Discussion

Whether active or not, default SNMP passwords, users, and passphrases must be changed to maintain security. If the service is running with the default authenticators, then anyone can gather data about the system and the network and use the information to potentially compromise the integrity of the system or network(s).

Check Content

Verify the Solaris 11 system does not use default SNMP community strings or passphrases.

The root role is required.

Find any occurrences of the snmpd.conf file delivered with Solaris packages:

# pkg search -l -Ho path snmpd.conf | awk '{ print "/"$1 }'
/etc/net-snmp/snmp/snmpd.conf

For each listed file, use the following command to review its contents:

# more [filename]

Review SNMP trap configurations for default community strings:

# grep trap /etc/net-snmp/snmp/snmpd.conf

Identify any community names, trap communities, or user password configurations set to default values. 
Examples: public, private, trap, public@localhost, password

If any default values are present, this is a finding.

Fix Text

The root role is required.

Stop the SNMP service:
# svcadm disable svc: /application/management/net-snmp:default

Open the /etc/snmp/snmpd.conf file and remove any lines containing default values.
# pfedit [/path/filename]

Create a new SNMPv3 user with strong authentication and privacy keys (if the service is required).

Restart the service (if the service is required).
# svcadm enable svc: /application/management/net-snmp:default

Ensure permissions on the configuration files are restricted:
# chmod 600 /etc/snmp/snmp.conf