Notified: January 10, 2002 Updated: February 21, 2002
ADTRAN Advisory: SNMPv1 Request and Trap Handling Vulnerabilities
Release Date: 19 February 2002 I. Summary
On February 12, 2002 the CERT®/CC released an advisory related to security vulnerabilities that may exist in network devices using SNMPv1 as the management protocol. In response to this advisory, CERT® Advisory CA-2002-03 Multiple Vulnerabilities in Many Implementations of the Simple Network Management Protocol (SNMP)", ADTRAN began executing the tests that elicit these vulnerabilities for all ADTRAN products that feature SNMPv1 capability. II. Impact
Preliminary test results have indicated multiple ADTRAN products exhibit certain vulnerabilities to SNMP messages. Some of these vulnerabilities can be exploited, resulting in a denial of service or service interruption. These results have not indicated any vulnerability that will allow an attacker to gain access to the affected device. III. Solution
ADTRAN is currently applying the PROTOS c06-SNMPv1 test suite to all products that feature SNMPv1 capability. Until ADTRAN has completed testing on all of its products and provided patches or fixes to eliminate these vulnerabilities, ADTRAN recommends considering one or more of the following solutions, as identified in CERT® Advisory CA-2002-03, to minimize your network’s potential exposure to these vulnerabilities: · Disable the SNMP Service
· Ingress filtering
· Egress filtering
· Filter SNMP traffic from non-authorized internal hosts
· Segregate SNMP traffic onto a separate management network
· Restrict SNMP traffic to Virtual Private Networks (VPNs)
· Change default community strings
ADTRAN’s NetVanta Solutions
ADTRAN’s NetVanta 2000 Series of products can be used to provide most of the solutions identified above, including ingress and egress filtering, filtering SNMP traffic from non-authorized internal hosts, and restricting SNMP traffic to Virtual Private Networks (VPNs). For further information on how NetVanta’s VPN and Firewall solutions can secure your network, please see http://www.adtran.com/netvanta2000. IV. For Further Information
For more information please see http://www.adtran.com/support/snmp.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.