UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The usbmuxd daemon must be disabled.


Overview

Finding ID Version Rule ID IA Controls Severity
V-58401 AOSX-09-000862 SV-72831r1_rule Medium
Description
Connections to unauthorized iOS devices (iPhones, iPods, and iPads) open the system to possible compromise via exfiltration of system data. Disabling the usbmuxd daemon blocks connections to iOS devices.
STIG Date
Apple OS X 10.9 (Mavericks) Workstation Security Technical Implementation Guide 2017-01-05

Details

Check Text ( C-59227r1_chk )
To check the status of the usbmuxd daemon, run the following command:

sudo launchctl list | grep usbmuxd

If there is any output, this is a finding.
Fix Text (F-63717r1_fix)
To disable the usbmuxd daemon, run the following command:

sudo launchtctl unload -w /System/Library/LaunchDaemons/com.apple.usbmuxd.plist