Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-1049 | GEN002340 | SV-38242r1_rule | ECLP-1 | Medium |
Description |
---|
Globally accessible audio and video devices have proven to be another security hazard. There is software capable of activating system microphones and video devices connected to user workstations and/or X terminals. Once the microphone has been activated, it is possible to eavesdrop on otherwise private conversations without the victim being aware of it. This action effectively changes the user's microphone into a bugging device. |
STIG | Date |
---|---|
HP-UX 11.31 Security Technical Implementation Guide | 2018-03-01 |
Check Text ( C-36419r1_chk ) |
---|
Check the owner of audio devices. Determine audio devices and class identifiers, i.e., audio should be listed as audio. # ioscan Determine audio device special files. # ioscan -fn -C |
Fix Text (F-31757r1_fix) |
---|
Change the owner of the audio device. # chown root |