The situation is the following:
MaxPatrol, if anyone is familiar with this scanner of vulnerability, gave the following: Vulnerable nodes
IP ad RES 192.168.1.50
The name of the ass ACI 192.168.1.50
161/UDP • SNMP
Versions of protocols: 1
Xerox DocuPrint N2825 Network Laser Printer - 2.12-02
There are other printers, but I would like to understand the problem on the example of this.
If you go to the web interface of the printer, there is only a brief word on SNMP, but no public and no accounts to configure, nothing is impossible, especially to remove.
However, if the computer has to go into the properties of the printer to configure the TCP/IP Port, there is a checkbox: SNMP Status is allowed, and below flaunts account public, it is there is why it is called "community Name".
In short, disable this setting of course, but it should be done on each computer and when you install new ones, go to settings and remove.
The question is, is there a way to remove this uchetku on the printer (searched - did not find) or the only option is to remove it on all computers, and most importantly how they would react to the MaxPatrol? The vulnerability description is not a word that this account is public available on it and won the comp, it turns out that most likely it scans the printer and then do not understand what to do?