UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must have USB Mass Storage disabled unless needed.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22579 GEN008480 SV-37982r1_rule ECSC-1 Low
Description
USB is a common computer peripheral interface. USB devices may include storage devices with the potential to install malicious software on a system or exfiltrate data
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2012-05-25

Details

Check Text ( C-37282r1_chk )
If the system needs USB storage, this vulnerability is not applicable.
Check if usb-storage is prevented from loading.
# grep 'install usb-storage /bin/true' /etc/modprobe.conf /etc/modprobe.d/*
If no results are returned, this is a finding.

Fix Text (F-32519r1_fix)
Prevent the usb-storage module from loading.
# echo 'install usb-storage /bin/true' >> /etc/modprobe.conf