UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network element must not use SSH Version 1 for administrative access.


Overview

Finding ID Version Rule ID IA Controls Severity
V-14717 NET1647 SV-15461r2_rule ECSC-1 Medium
Description
SSH Version 1 is a protocol that has never been defined in a standard. Since SSH-1 has inherent design flaws which make it vulnerable to, e.g., man-in-the-middle attacks, it is now generally considered obsolete and should be avoided by explicitly disabling fallback to SSH-1.
STIG Date
Perimeter Router Security Technical Implementation Guide Juniper 2015-07-01

Details

Check Text ( C-12926r2_chk )
If SSH is used for administrative access, then Version 2 must be configured as shown in the following example:

system {
services {
ssh {
protocol-version v2;
}
}
}
Fix Text (F-14184r5_fix)
Configure the network device to use SSH version 2.