Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-4295 | GEN005500 | SV-40862r2_rule | High |
Description |
---|
SSHv1 is not a DoD-approved protocol and has many well-known vulnerability exploits. Exploits of the SSH daemon could provide immediate root access to the system. |
STIG | Date |
---|---|
AIX 6.1 SECURITY TECHNICAL IMPLEMENTATION GUIDE | 2017-12-08 |
Check Text ( C-39554r3_chk ) |
---|
Examine the sshd configuration file. # cat /etc/ssh/sshd_config | grep -i "Protocol 2" If the value of "Protocol" is not set to 2, or is commented out, this is a finding. |
Fix Text (F-4206r2_fix) |
---|
Edit the configuration file and modify the Protocol line. Protocol 2 Restart sshd: /sbin/init.d/secsh stop /sbin/init.d/secsh start |