UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network element must be configured to disable functionality that provides the capability for automatic execution of code on mobile devices without user direction.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34539 SRG-NET-000073-IDPS-NA SV-45381r1_rule Low
Description
Auto execution vulnerabilities can result in malicious programs being executed that can be used to cause a denial of service on the device and hence disrupt network services. Examples of information system functionality that provide the capability for automatic execution of code are Auto Run and AutoPlay. Disabling applications on mobile devices is outside the scope of the IDPS.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-42730r1_chk )
This requirement is NA for IDPS. No fix required.
Fix Text (F-38778r1_fix)
This requirement is NA for IDPS. No fix required.