UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The firewall must reject requests for access or services where the source address received by the firewall specifies a loopback address.


Overview

Finding ID Version Rule ID IA Controls Severity
V-14644 NET0380 SV-15270r2_rule ECSC-1 Medium
Description
The loopback address is used by an Inter-Processor Control (IPC) mechanism that enables the client and server portion of an application running on the same machine to communicate, and so it is trusted. It should never be used as the source IP address of an inbound or outbound transmission.
STIG Date
Firewall Security Technical Implementation Guide 2016-12-21

Details

Check Text ( C-12660r2_chk )
Review the device configuration to determine if filters are in place to block loopback addresses.

If loopback addresses are not being filtered by the firewall, this is a finding.
Fix Text (F-14104r2_fix)
Establish filters to block any attempt from the firewall or any network to pass any packets claiming to be from a loopback address.