The vCenter server must disable SNMPv1/2 receivers.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-256345 | VCSA-70-000265 | SV-256345r885646_rule | CCI-001967 | medium |
| Description | ||||
| SNMPv3 supports commercial-grade security, including authentication, authorization, access control, and privacy. Previous versions of the protocol contained well-known security weaknesses that were easily exploited. Therefore, SNMPv1/2 receivers must be disabled, while SNMPv3 is configured in another control. vCenter exposes SNMP v1/2 in the UI and SNMPv3 in the CLI. | ||||
| STIG | Date | |||
| VMware vSphere 7.0 vCenter Security Technical Implementation Guide | 2023-12-21 | |||
Details
Check Text (C-256345r885646_chk)
From the vSphere Client, go to Host and Clusters.
Select a vCenter Server >> Configure >> Settings >> General.
Click "Edit".
On the "SNMP receivers" tab, note the presence of any enabled receiver.
If there are any enabled receivers, this is a finding.
Fix Text (F-59963r885645_fix)
From the vSphere Client, go to Host and Clusters.
Select a vCenter Server >> Configure >> Settings >> General.
Click "Edit".
On the "SNMP receivers" tab, ensure all receivers are disabled.