Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-4295 | GEN005500 | SV-35209r1_rule | DCPP-1 ECSC-1 | High |
Description |
---|
SSHv1 is not a DoD-approved protocol and has many well-known vulnerability exploits. Exploits of the SSH daemon could provide immediate root access to the system. |
STIG | Date |
---|---|
HP-UX 11.23 Security Technical Implementation Guide | 2015-06-12 |
Check Text ( C-35053r1_chk ) |
---|
Check the SSH daemon configuration. Note that keywords are case-insensitive and arguments (args) are case-sensitive. keyword=Protocol Required arg(s)=2 Default arg values include: "2,1" Note: When the default "arg" value exactly matches the required "arg" value (see above), the Examine the file. # cat /opt/ssh/etc/sshd_config | tr '\011' ' ' | tr -s ' ' | sed -e 's/^[ \t]*//' | grep -v '^#' | grep -i "Protocol" | cut -f 2,2 -d " " If the return value is "1" or "2,1" (double quotes are for emphasis only) , this is a finding. |
Fix Text (F-30340r1_fix) |
---|
Edit the configuration file and modify the Protocol line entry to appear as follows: Protocol 2 |