A vulnerability has been reported in Net-SNMP, which can be exploited by malicious people to spoof authenticated SNMPv3 packets.
The vulnerability is caused due to an error within the verification of the HMAC digest. This can be exploited to increase the chance of successfully spoofing a packet to 1 in 256 by sending a specially crafted SNMPv3 packet with an incomplete 1 byte HMAC digest.
Successful exploitation requires a valid username.
The vulnerability is reported in versions prior to 18.104.22.168 of the 5.4.x branch, 22.214.171.124 of the 5.3.x branch, and 126.96.36.199 of the 5.2.x branch.
Solution: Update to version 188.8.131.52, 184.108.40.206, or 220.127.116.11.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org