UCF STIG Viewer Logo

The OS X system must be configured with the usbmuxd daemon disabled.


Overview

Finding ID Version Rule ID IA Controls Severity
V-76103 AOSX-12-000862 SV-90791r1_rule Medium
Description
Connections to unauthorized iOS devices (iPhones, iPods, and iPads) open the system to possible compromise via exfiltration of system data. Disabling the "usbmuxd" daemon blocks connections to iOS devices.
STIG Date
Apple OS X 10.12 Security Technical Implementation Guide 2018-12-24

Details

Check Text ( C-75787r1_chk )
To check if the "usbmuxd" daemon is disabled, use the following command:

/usr/bin/sudo /bin/launchctl print-disabled system | /usr/bin/grep com.apple.usbmuxd

If the results do not show the following, this is a finding:

"com.apple.usbmuxd" => true
Fix Text (F-82741r1_fix)
To disable the "usbmuxd" daemon, run the following command:

/usr/bin/sudo /bin/launchctl disable system/com.apple.usbmuxd

The system may need to be restarted for the update to take effect.