UCF STIG Viewer Logo

The usbmuxd daemon must be disabled.


Overview

Finding ID Version Rule ID IA Controls Severity
V-67691 AOSX-11-000862 SV-82181r1_rule Medium
Description
Connections to unauthorized iOS devices (iPhones, iPods, and iPads) open the system to possible compromise via exfiltration of system data. Disabling the usbmuxd daemon blocks connections to iOS devices.
STIG Date
Apple OS X 10.11 Security Technical Implementation Guide 2018-01-04

Details

Check Text ( C-68257r1_chk )
If the system is approved for management of iOS devices, this is not applicable.

To check if the "usbmuxd" daemon is disabled, use the following command:

/usr/bin/sudo /bin/launchctl print-disabled system | /usr/bin/grep com.apple.usbmuxd

If the results do not show the following, this is a finding.

"com.apple.usbmuxd" => true
Fix Text (F-73805r1_fix)
To disable the "usbmuxd" daemon, run the following command:

/usr/bin/sudo /bin/launchctl disable system/com.apple.usbmuxd

The system may need to be restarted for the update to take effect.