Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
SRG-NET-000244-IDPS-000229 | SRG-NET-000244-IDPS-000229 | SRG-NET-000244-IDPS-000229_rule | Medium |
Description |
---|
There are a number of publicly available tools that exist to facilitate the hijacking of TCP sessions. An attacker using such tools can determine the TCP sequence and acknowledgement numbers that two hosts are using in a communication session. This information could enable the attacker to take over the legitimate network connection of an authorized user and inject commands into the session. This is particularly serious because most forms of one-time passwords do not prevent this access. |
STIG | Date |
---|---|
IDPS Security Requirements Guide (SRG) | 2012-03-08 |
Check Text ( C-43393_chk ) |
---|
Identify the signatures which monitor for IP hijacking of TCP sessions. If a signature that monitors for IP hijacking is not installed, this is a finding. |
Fix Text (F-43393_fix) |
---|
Download and install the latest signatures designed to monitor for IP hijacking of TCP sessions. |