The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2022-24806

CVE-2022-24806: Net-SNMP Input Validation Vulnerability

CVE-2022-24806 is an improper input validation vulnerability in Net-SNMP that allows authenticated users to exploit malformed OIDs. This article covers the technical details, affected versions, and mitigation strategies.

Published: February 11, 2026

CVE-2022-24806 Overview

CVE-2022-24806 is an Improper Input Validation vulnerability affecting net-snmp, a widely used suite of tools for the Simple Network Management Protocol (SNMP). Prior to version 5.9.2, authenticated users with read-write credentials can exploit this flaw by sending malformed OIDs in SET requests to the master agent and subagent simultaneously. This vulnerability can lead to denial of service conditions on affected systems running vulnerable net-snmp versions.

SNMP is a critical protocol used extensively in enterprise network management, making vulnerabilities in net-snmp particularly concerning for organizations managing large-scale infrastructure. The vulnerability requires authentication but can be exploited remotely over the network.

Critical Impact

Authenticated attackers with read-write SNMP credentials can cause denial of service conditions by exploiting improper input validation when processing malformed OIDs in concurrent master agent and subagent operations.

Affected Products

  • net-snmp versions prior to 5.9.2
  • Fedora 35 and 36
  • Debian Linux 10.0 and 11.0
  • Red Hat Enterprise Linux 9.0 and various EUS releases
  • Red Hat Enterprise Linux for ARM64, IBM z Systems, and Power architectures

Discovery Timeline

  • 2022 - Vulnerability discovered by Yu Zhang of VARAS@IIE and Nanyu Zhong of VARAS@IIE
  • 2022 - Security patch developed with assistance from Arista Networks
  • 2024-04-16 - CVE-2022-24806 published to NVD
  • 2025-01-17 - Last updated in NVD database

Technical Details for CVE-2022-24806

Vulnerability Analysis

The vulnerability exists in net-snmp's handling of SET operations when malformed Object Identifiers (OIDs) are processed simultaneously by both the master agent and subagent components. The improper input validation allows specially crafted OIDs to bypass normal validation checks when these components interact concurrently, leading to unexpected behavior and potential service disruption.

This vulnerability is part of a family of related security issues (CVE-2022-24805 through CVE-2022-24810) discovered in net-snmp that affect various aspects of OID handling and VACM (View-based Access Control Model) table operations. While some of the related vulnerabilities only require read-only credentials, CVE-2022-24806 specifically requires read-write access to exploit.

Root Cause

The root cause is inadequate input validation in the code paths handling SET requests when malformed OIDs are processed by both the master agent and subagent simultaneously. The concurrent processing of these malformed inputs exposes a validation gap that allows the malformed data to cause improper system behavior. The fix implemented in version 5.9.2 adds proper validation checks to reject malformed OIDs before they can be processed in these concurrent scenarios.

Attack Vector

The attack requires network access to the SNMP service (typically UDP port 161) and valid read-write credentials. An attacker must:

  1. Obtain valid SNMPv1/v2c community strings with read-write access, or SNMPv3 credentials with appropriate privileges
  2. Craft malformed OID values designed to bypass input validation
  3. Send SET requests targeting operations that involve both master agent and subagent processing simultaneously
  4. The improper handling of these concurrent operations with malformed OIDs leads to denial of service
text
# From net-snmp version 5.9.2 CHANGES file - Security fixes documentation
# Source: https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775

*5.9.2*:
    security:
      - These two CVEs can be exploited by a user with read-only credentials:
          - CVE-2022-24805 A buffer overflow in the handling of the INDEX of
            NET-SNMP-VACM-MIB can cause an out-of-bounds memory access.
          - CVE-2022-24809 A malformed OID in a GET-NEXT to the nsVacmAccessTable
            can cause a NULL pointer dereference.
      - These CVEs can be exploited by a user with read-write credentials:
          - CVE-2022-24806 Improper Input Validation when SETing malformed
            OIDs in master agent and subagent simultaneously
          - CVE-2022-24807 A malformed OID in a SET request to
            SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an
            out-of-bounds memory access.
          - CVE-2022-24808 A malformed OID in a SET request to
            NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference
          - CVE-2022-24810 A malformed OID in a SET to the nsVacmAccessTable
            can cause a NULL pointer dereference.
      - To avoid these flaws, use strong SNMPv3 credentials and do not share them.
        If you must use SNMPv1 or SNMPv2c, use a complex community string
        and enhance the protection by restricting access to a given IP address range.
      - Thanks are due to Yu Zhang of VARAS@IIE and Nanyu Zhong of VARAS@IIE for
        reporting the following CVEs that have been fixed in this release, and
        to Arista Networks for providing fixes.

Source: GitHub Net-SNMP Commit

Detection Methods for CVE-2022-24806

Indicators of Compromise

  • Unusual SNMP SET requests containing malformed or abnormally structured OIDs
  • SNMP daemon crashes or unexpected service restarts on monitored systems
  • Log entries indicating OID parsing errors or validation failures in snmpd logs
  • Increased SNMP traffic from unauthorized or unexpected source IP addresses

Detection Strategies

  • Monitor SNMP service logs for repeated parsing errors, validation failures, or crash events
  • Implement network-based intrusion detection rules to flag SNMP SET requests with malformed OID structures
  • Deploy endpoint detection to monitor for snmpd process crashes or abnormal terminations
  • Audit SNMP authentication attempts and flag any unusual access patterns with read-write credentials

Monitoring Recommendations

  • Enable detailed logging for snmpd to capture OID processing errors and authentication events
  • Configure alerts for SNMP service availability to detect denial of service conditions
  • Review SNMP community strings and SNMPv3 user accounts for unauthorized changes
  • Monitor network traffic for SNMP requests originating from unexpected IP addresses or geographic locations

How to Mitigate CVE-2022-24806

Immediate Actions Required

  • Upgrade net-snmp to version 5.9.2 or later to obtain the security patch
  • Migrate from SNMPv1/v2c to SNMPv3 with strong authentication and encryption
  • Restrict SNMP access to trusted IP address ranges using firewall rules or SNMP access control lists
  • Review and strengthen SNMP credentials, avoiding shared or default community strings

Patch Information

The vulnerability is fixed in net-snmp version 5.9.2. The security patch is available via the GitHub Net-SNMP Commit. Distribution-specific patches are available through:

  • Debian Security Advisory DSA-5209
  • Debian LTS Announcement
  • Fedora Package Announcement
  • Gentoo GLSA Advisory
  • Red Hat Bug Report

Workarounds

  • Use strong SNMPv3 credentials with authentication and privacy protocols enabled, and do not share credentials across systems
  • If SNMPv1 or SNMPv2c must be used, implement complex community strings that are difficult to guess
  • Restrict SNMP access to specific trusted IP addresses or network ranges using host-based or network firewalls
  • Disable read-write SNMP access where not strictly required, limiting exposure to read-only operations
bash
# Example snmpd.conf configuration to restrict access
# Restrict SNMP access to trusted management network only
rocommunity public 10.0.0.0/24
rwcommunity private 10.0.0.5/32

# For SNMPv3 (recommended), configure strong auth and privacy
# createUser myuser SHA "authpassword123" AES "privpassword456"
# rouser myuser priv
# rwuser myadmin priv

# Firewall rule to restrict SNMP access (iptables example)
# iptables -A INPUT -p udp --dport 161 -s 10.0.0.0/24 -j ACCEPT
# iptables -A INPUT -p udp --dport 161 -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechNet Snmp

  • SeverityMEDIUM

  • CVSS Score5.3

  • EPSS Probability0.14%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-20

  • NVD-CWE-noinfo
  • Technical References
  • Red Hat Bug Report

  • Debian LTS Announcement

  • Fedora Package Announcement

  • Gentoo GLSA Advisory

  • Debian Security Advisory
  • Vendor Resources
  • GitHub Net-SNMP Commit
  • Related CVEs
  • CVE-2026-28775: IDC SFX Series SNMP RCE Vulnerability

  • CVE-2025-68615: Net-SNMP Buffer Overflow Vulnerability

  • CVE-2020-15862: Net-SNMP Privilege Escalation Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English