Service:
snmpd ,
AgentX
Protocol:
UDPPort:
161Used for:
Monitoring and managing network devicesWhy It’s Open
SNMP allows administrators to monitor metrics, modify settings, and manage devices remotely — widely used in routers, switches, servers.
Common Risks
- Default Community Strings:
publicandprivateare often unchanged. - Info Disclosure: Device names, interfaces, routing tables, etc.
- Write Access: Can reconfigure or disable systems if RW access is open.
Want to save time on reporting?
Let PentestPad generate, track, and export your reports - automatically.

Enumeration & Testing
Nmap check
nmap -sU -p 161 --script=snmp-info
snmpwalk -v2c -c publicWhat to Look For
| Checkpoint | What it means |
|---|---|
public/private | Default, easily guessable strings |
| Version 1/2c | No encryption, insecure |
| Write access enabled | Serious security risk |
Known Exploits
-
CVE-2002-0012 Buffer overflow in SNMP implementations allows remote attackers to execute arbitrary code via crafted SNMP packets 🔗NVD Entry
-
CVE-2012-6096 Net-SNMP before 5.7.2 has a vulnerability in the
snmp_pdu_parsefunction, leading to denial of service. 🔗 NVD Entry
Mitigation
- Use SNMPv3 with authentication and encryption.
- Change default community strings.
- Restrict SNMP access to trusted IPs.
Real-World Example
Misconfigured SNMP devices exposed on the internet have leaked sensitive infrastructure data, and been abused in DDoS reflection attacks.
TL;DR
- Service: SNMP (Monitoring & Management)
- Default Port: 161/UDP
- Risks: Information disclosure, unauthorized access
- Mitigation: Use strong community strings, restrict access, disable if unused