UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Samsung Android must be configured to not allow more than 10 consecutive failed authentication attempts.


Overview

Finding ID Version Rule ID IA Controls Severity
V-260443 KNOX-14-710060 SV-260443r950908_rule Medium
Description
The more attempts an adversary has to guess a password, the more likely the adversary will enter the correct password and gain access to resources on the device. Setting a limit on the number of attempts mitigates this risk. Setting the limit at 10 or fewer attempts gives authorized users the ability to make a few mistakes when entering the password but still provides adequate protection against dictionary or brute force attacks on the password. SFR ID: FMT_SMF_EXT.1.1 #2c, FIA_AFL_EXT.1.5
STIG Date
Samsung Android 14 MDFPP 3.3 BYOAD Security Technical Implementation Guide 2024-02-21

Details

Check Text ( C-64173r950906_chk )
Review the configuration to determine if the Samsung Android devices' Work Environment is allowing only 10 or fewer consecutive failed authentication attempts.

This validation procedure is performed on both the management tool and the Samsung Android device.

On the management tool, in the device password policies, verify "max password failures for local wipe" is set to "10" attempts or less.

On the Samsung Android device, confirm if the user has "One Lock" enabled (Settings >> Security and privacy >> More security settings >> Work profile security >> Use one lock).

If "One Lock" is enabled:
1. Lock the device.
2. Make attempts to unlock the Device with incorrect PIN and validate that the device reports that if you do not enter the correct PIN within the next few attempts that a wipe will occur.

If "One Lock" is disabled:
1. Wait for the Work profile to Lock (determined by Auto lock work profile configuration) - or reboot the Device.
2. Attempt to unlock the Work profile with an incorrect PIN and validate that the device reports "9" or less attempts left.

If on the management tool "max password failures for local wipe" is not set to "10" attempts or less, or on the Samsung Android device - after making incorrect PIN entry attempts - it does not report that the device will wipe, this is a finding.
Fix Text (F-64080r950907_fix)
Configure the Samsung Android devices to allow only 10 or fewer consecutive failed authentication attempts.

On the management tool, in the device password policies, set "max password failures for local wipe" to "10" attempts or fewer.

A device password must be set for "max password failures for local wipe" to become active.