UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Oracle JRE 8 must disable the dialog enabling users to grant permissions to execute signed content from an untrusted authority.


Overview

Finding ID Version Rule ID IA Controls Severity
V-66949 JRE8-WN-000080 SV-81439r1_rule Medium
Description
Java applets exist both signed and unsigned. Even for signed applets, there can be many sources, some of which may be purveyors of malware. Applet sources considered trusted can have their information populated into the browser, enabling Java to validate applets against trusted sources. Permitting execution of signed Java applets from untrusted sources may result in acquiring malware, and risks system modification, invasion of privacy, or denial of service.
STIG Date
Java Runtime Environment (JRE) Version 8 STIG for Windows 2016-09-27

Details

Check Text ( C-67585r1_chk )
If the system is on the SIPRNet, this requirement is NA.

Navigate to the system-level “deployment.properties” file for Java.

The location of the deployment.properties file is defined in \Lib\deployment.config

If the key, “deployment.security.askgrantdialog.notinca=false” is not present, this is a finding.

If the key, “deployment.security.askgrantdialog.notinca.locked” is not present, this is a finding.

If the key “deployment.security.askgrantdialog.notinca” exists and is set to true, this is a finding.
Fix Text (F-73049r2_fix)
If the system is on the SIPRNet, this requirement is NA.

Disable the “Allow user to grant permissions to content from an untrusted authority” feature.

Navigate to the system-level “deployment.properties” file for JRE.

The location of the deployment.properties file is defined in \Lib\deployment.config

Add the key “deployment.security.askgrantdialog.notinca=false” to the deployment.properties file.

Add the key “deployment.security.askgrantdialog.notinca.locked” to the deployment.properties file.