Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-19258 | WIR1405-03 | SV-21173r2_rule | ECSC-1 | Medium |
Description |
---|
Bluetooth usage could provide an attack vector for a hacker to connect to a BlackBerry device without the knowledge of the user. DoD data would then be vulnerable. |
STIG | Date |
---|---|
BlackBerry Enterprise Server (version 5.x), Part 3 Security Technical Implementation Guide | 2013-03-21 |
Check Text ( C-23293r2_chk ) |
---|
Detailed Policy Requirements: See Check WIR1405-01 (V0014198) for detailed policy requirements and check procedures. *****For this check, -Set IT Policy rule “Disable Headset Profile” (Bluetooth policy group) to “Yes" for non-headset IT policies. -Set IT Policy rule “Disable Headset Profile” (Bluetooth policy group) to “No" for headset IT policies. Check Procedures: This is a BES IT Policy check. Recommend all checks related to BES IT policies be reviewed using the procedure in Check WIR1400-01 (V0003545). *****Verify IT Policy rule “Disable Headset Profile” (Bluetooth policy group) is set as required. |
Fix Text (F-23386r1_fix) |
---|
Configure the IT Policy rule as specified in the "Checks" block. |