T 5.67 Unauthorised execution of network management functions

As a consequence of the unauthorised execution of network management functions, active network components may be controlled partially or completely. Amongst other things, the control options depend on the network management protocol used, e.g. SNMP or CMIP/CMOT. This may result in a loss of network integrity, of the availability of all or individual network components, and of the confidentiality and/or integrity of data.

Using a service protocol, e.g. SNMP, dedicated ports of active network components can be enabled and specifically disabled. Moreover, the VLAN configuration, routing tables, the router configuration, as well as the configuration of filters may be manipulated, for example (see T 3.28 Inadequate configuration of active network components). Additionally, the option of distributing firmware updates over the network may be used in order to install software to active network components without authorisation, at which this software in turn may be used to perform or support manifold attacks to components within the network.