Port 162 – SNMP Trap

Service:

snmptrapd

Protocol:

UDP

Port:

162

Used for:

SNMP Trap (Asynchronous Notifications)

Why It’s Open

Used by network management systems (NMS) to receive alerts from SNMP agents. For example, when a device goes offline or an interface fails.

Common Risks

  • Spoofed Traps: Can overwhelm or mislead monitoring systems.
  • Reflection Attacks: If misused, can be leveraged in DDoS scenarios.
  • Unfiltered Sources: Accepting traps from untrusted devices.

Want to save time on reporting?

Let PentestPad generate, track, and export your reports - automatically.

logo-cta

Enumeration & Testing

Bash checks

Terminal window
nmap -sU -p 162
snmptrapd -f -Lo -d

What to Look For

CheckpointWhat it means
Unauthenticated trapsCan be spoofed
Open to publicMay allow abuse or noise injection

Known Exploits

  1. CVE-2002-0013 SNMP trap handling vulnerability allows remote attackers to cause a denial of service or execute arbitrary code. 🔗 NVD Entry

Mitigation

  • Restrict accepted trap sources.
  • Use SNMPv3 with authentication.
  • Monitor for malformed or unexpected traps.

📎 TL;DR

  • Service: SNMP Trap (Asynchronous Notifications)
  • Default Port: 162/UDP
  • Risks: Denial of service, code execution
  • Mitigation: Restrict SNMP trap sources, monitor for unusual