HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 5.67 Unauthorised execution of network management functions

T 5.67 Unauthorised execution of network management functions

Unauthorised execution of network management functions allows partial or full control of active network components. One of the factors determining the possibilities of control is the network management protocol in use (e.g. SNMP or CMIP/CMOT). This can impair network integrity, the availability of some or all network segments, as well as the confidentiality/integrity of data.

The use of a service protocol such as SNMP allows dedicated ports of active network components to be activated and deactivated. Furthermore, VLAN configuration, routing tables, router configuration as well as the filter configuration can be manipulated (refer to T 3.28 Inadequate configuration of active network components). In addition, the possibility of the distribution of firmware updates across the network allows unauthorised installation of software on active network components. This software might allow and facilitate the infiltration on network components in a great variety of ways.


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 1999
home