CVE-2025-68615

9.8 CRITICAL

📋 TL;DR

A buffer overflow vulnerability in net-snmp's snmptrapd daemon allows remote attackers to crash the service via specially crafted SNMP trap packets. This affects all systems running vulnerable versions of net-snmp with snmptrapd enabled. The high CVSS score indicates potential for remote code execution.

💻 Affected Systems

Products:
  • net-snmp
Versions: All versions prior to 5.9.5 and 5.10.pre2
Operating Systems: Linux, Unix, BSD, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with snmptrapd daemon running. Default installations may not have this enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, service disruption, and potential lateral movement.

🟠

Likely Case

Denial of service through daemon crash, potentially disrupting SNMP monitoring and management.

🟢

If Mitigated

Limited to service disruption if proper network segmentation and access controls prevent exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted SNMP trap packets to the vulnerable daemon.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.9.5 or 5.10.pre2

Vendor Advisory: https://github.com/net-snmp/net-snmp/security/advisories/GHSA-4389-rwqf-q9gq

Restart Required: Yes

Instructions:

1. Update net-snmp to version 5.9.5 or higher. 2. For Debian/Ubuntu: apt update && apt upgrade net-snmp. 3. For RHEL/CentOS: yum update net-snmp. 4. Restart snmptrapd service.

🔧 Temporary Workarounds

Disable snmptrapd

linux

Stop and disable the vulnerable snmptrapd daemon if not required.

systemctl stop snmptrapd
systemctl disable snmptrapd

Network Access Control

linux

Restrict SNMP trap port (default 162) access to trusted sources only.

iptables -A INPUT -p udp --dport 162 -s trusted_ip -j ACCEPT
iptables -A INPUT -p udp --dport 162 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SNMP traffic.
  • Deploy intrusion detection/prevention systems to monitor for SNMP exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check net-snmp version: snmptrapd -v 2>&1 | head -1

Check Version:

snmptrapd -v 2>&1 | head -1

Verify Fix Applied:

Verify version is 5.9.5 or higher: snmptrapd -v 2>&1 | grep -E '5\.9\.5|5\.10'

📡 Detection & Monitoring

Log Indicators:

  • snmptrapd crash logs in systemd journal or syslog
  • Unexpected SNMP trap packets from untrusted sources

Network Indicators:

  • Unusual SNMP trap traffic patterns
  • Malformed SNMP packets to port 162

SIEM Query:

source="snmptrapd" AND (event="crash" OR event="segfault")

🔗 References

📤 Share & Export