UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The UEM server must recognize only system-generated session identifiers.


Overview

Finding ID Version Rule ID IA Controls Severity
V-234407 SRG-APP-000223-UEM-000134 SV-234407r961116_rule Medium
Description
Applications utilize sessions and session identifiers to control application behavior and user access. If an attacker can guess the session identifier, or can inject or manually insert session information, the session may be compromised. Unique session IDs address man-in-the-middle attacks, including session hijacking or insertion of false information into a session. If the attacker is unable to identify or guess the session information related to pending application traffic, they will have more difficulty in hijacking the session or otherwise manipulating valid sessions. This requirement focuses on communications protection for the application session rather than for the network packet. This requirement applies to applications that utilize communications sessions. This includes, but is not limited to, web-based applications and Service-Oriented Architectures (SOA).
STIG Date
Unified Endpoint Management Server Security Requirements Guide 2024-07-02

Details

Check Text ( C-37592r614231_chk )
Verify the UEM server recognizes only system-generated session identifiers.

If the UEM server does not recognize only system-generated session identifiers, this is a finding.
Fix Text (F-37557r614232_fix)
Configure the UEM server to recognize only system-generated session identifiers.