Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-66951 | JRE8-WN-000090 | SV-81441r2_rule | Medium |
Description |
---|
Java applets exist both signed and unsigned. Even for signed applets, there can be many sources, some of which may be purveyors of malware. Applet sources considered trusted can have their information populated into the browser, enabling Java to validate applets against trusted sources. Permitting execution of signed Java applets from untrusted sources may result in acquiring malware, and risks system modification, invasion of privacy, or denial of service. Ensuring users cannot change settings contributes to a more consistent security profile. |
STIG | Date |
---|---|
Java Runtime Environment (JRE) version 8 STIG for Windows | 2017-06-29 |
Check Text ( C-67587r2_chk ) |
---|
If the system is on the SIPRNet, this requirement is NA. Navigate to the system-level "deployment.properties" file for JRE. - or - If the key "deployment.security.askgrantdialog.show=false" is not present, this is a finding. If the key "deployment.security.askgrantdialog.show.locked" is not present, this is a finding. If the key "deployment.security.askgrantdialog.show" exists and is set to "true", this is a finding. |
Fix Text (F-73051r2_fix) |
---|
If the system is on the SIPRNet, this requirement is NA. Lock the "Allow user to grant permissions to content from an untrusted authority" feature. Navigate to the system-level "deployment.properties" file for JRE. Add the key "deployment.security.askgrantdialog.show=false" to the "deployment.properties" file. Add the key "deployment.security.askgrantdialog.show.locked" to the "deployment.properties" file. |