Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-27320 | SRG-NET-000150 | SV-34624r1_rule | Medium |
Description |
---|
Without authentication, an unauthorized user can easily connect to a nearby access-point (AP) within the enclave. In addition, a rogue AP owned by an attacker can accept connections from wireless stations enabling it to intercept traffic and initiate man-in-the-middle attacks before allowing traffic to flow to the intended host. Hence, it is imperative that authentication is bi-directional using cryptography to ensure a high level of trust and authenticity. |
STIG | Date |
---|---|
Network Security Requirements Guide | 2011-12-28 |
Check Text ( None ) |
---|
None |
Fix Text (None) |
---|
None |