Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-62971 | RICX-DM-000119 | SV-77461r1_rule | Medium |
Description |
---|
If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by increasing the window of opportunity for attempts at guessing and brute-force attacks. The number of changed characters refers to the number of changes required with respect to the total number of positions in the current password. In other words, characters may be the same within the two passwords; however, the positions of the like characters must be different. |
STIG | Date |
---|---|
Riverbed SteelHead CX v8 NDM Security Technical Implementation Guide | 2015-11-30 |
Check Text ( C-63723r1_chk ) |
---|
Verify that RiOS is configured to require that when a password is changed, the characters are changed in at least 15 of the positions within the password. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Verify that "Minimum Character Difference Between Passwords:" is set to "15" If "Minimum Character Difference Between Passwords:" is not set to "15", this is a finding. |
Fix Text (F-68889r1_fix) |
---|
Configure RiOS to require that when a password is changed, the characters are changed in at least 15 of the positions within the password. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Set the value of "Minimum Character Difference Between Passwords:" to "15" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently |