Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-26995 | SRG-NET-000073 | SV-34289r1_rule | Medium |
Description |
---|
Auto execution vulnerabilities can result in malicious programs being executed that can be used to cause a denial of service on the device and hence disrupt network services. Examples of information system functionality that provide the capability for automatic execution of code are AutoRun and AutoPlay. |
STIG | Date |
---|---|
Network Security Requirements Guide | 2011-12-28 |
Check Text ( None ) |
---|
None |
Fix Text (None) |
---|
None |