UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Voice Video Endpoint, when using passwords or PINs for authentication or authorization, must cryptographically-protect the transmission.


Overview

Finding ID Version Rule ID IA Controls Severity
V-66749 SRG-NET-000400-VVEP-00033 SV-81239r1_rule Medium
Description
Passwords need to be protected at all times and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised. This does not apply to authentication for the purpose of configuring the device itself (management).
STIG Date
Voice Video Endpoint Security Requirements Guide 2016-06-24

Details

Check Text ( C-67399r1_chk )
Verify the Voice Video Endpoint, when using passwords or PINs for authentication or authorization, cryptographically protects the transmission.

If the Voice Video Endpoint, when using passwords or PINs for authentication or authorization, does not cryptographically protect the transmission, this is a finding.
Fix Text (F-72849r1_fix)
Configure the Voice Video Endpoint, when using passwords or PINs for authentication or authorization, to cryptographically protect the transmission.