SNMP enumeration
Default SNMP passwords allow attackers to view or modify the SNMP configuration settings. Attackers can enumerate SNMP on remote network devices for:
Information about network resources such as routers, shares, devices, etc.
ARP and routing tables
Device specific information
Traffic statistics
And more.
Tools
Remediation
Minimize the attack surface by removing the SNMP agents where not needed.
Change default public community strings.
Upgrade to SNMPv3, which encrypts the community strings and messages.
Implement group policy for additional restriction on anonymous connections.
Implement firewalls to restrict unnecessary connections.
Implement IPSec filtering.
Block access to TCP/UDP ports 161.
Encrypt and authenticate using IPSEC.