Service:
snmptrapd
Protocol:
UDPPort:
162Used for:
SNMP Trap (Asynchronous Notifications)Why It’s Open
Used by network management systems (NMS) to receive alerts from SNMP agents. For example, when a device goes offline or an interface fails.
Common Risks
- Spoofed Traps: Can overwhelm or mislead monitoring systems.
- Reflection Attacks: If misused, can be leveraged in DDoS scenarios.
- Unfiltered Sources: Accepting traps from untrusted devices.
Want to save time on reporting?
Let PentestPad generate, track, and export your reports - automatically.

Enumeration & Testing
Bash checks
nmap -sU -p 162
snmptrapd -f -Lo -dWhat to Look For
| Checkpoint | What it means |
|---|---|
| Unauthenticated traps | Can be spoofed |
| Open to public | May allow abuse or noise injection |
Known Exploits
- CVE-2002-0013 SNMP trap handling vulnerability allows remote attackers to cause a denial of service or execute arbitrary code. 🔗 NVD Entry
Mitigation
- Restrict accepted trap sources.
- Use SNMPv3 with authentication.
- Monitor for malformed or unexpected traps.
📎 TL;DR
- Service: SNMP Trap (Asynchronous Notifications)
- Default Port: 162/UDP
- Risks: Denial of service, code execution
- Mitigation: Restrict SNMP trap sources, monitor for unusual