The vCenter server must disable SNMPv1/2 receivers.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-258932 | VCSA-80-000265 | SV-258932r961878_rule | Medium |
| Description |
| SNMPv3 supports commercial-grade security, including authentication, authorization, access control, and privacy. Previous versions of the protocol contained well-known security weaknesses that were easily exploited. Therefore, SNMPv1/2 receivers must be disabled, while SNMPv3 is configured in another control. vCenter exposes SNMP v1/2 in the UI and SNMPv3 in the CLI. |
| STIG | Date |
| VMware vSphere 8.0 vCenter Security Technical Implementation Guide | 2025-06-09 |
Details
| Check Text (C-62672r934452_chk) |
| From the vSphere Client, go to Host and Clusters. Select a vCenter Server >> Configure >> Settings >> General. Click "Edit". On the "SNMP receivers" tab, note the presence of any enabled receiver. If there are any enabled receivers, this is a finding. |
| Fix Text (F-62581r934453_fix) |
| From the vSphere Client, go to Host and Clusters. Select a vCenter Server >> Configure >> Settings >> General. Click "Edit". On the "SNMP receivers" tab, ensure all receivers are disabled. |