UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Voice Video Endpoint must implement replay-resistant authentication mechanisms for network access.


Overview

Finding ID Version Rule ID IA Controls Severity
V-66709 SRG-NET-000147-VVEP-00015 SV-81199r1_rule Medium
Description
A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authenticator and the application validating the user credentials must not be vulnerable to a replay attack. An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous authentication message. Voice video endpoints often use passwords or PINs that can be easily exploited. This requirement only applies to components where this is specific to the function of the device or has the concept of an organizational user. This does not apply to authentication for the purpose of configuring the device itself (i.e., device management).
STIG Date
Voice Video Endpoint Security Requirements Guide 2017-01-04

Details

Check Text ( C-67335r1_chk )
Verify the Voice Video Endpoint implements replay-resistant authentication mechanisms for network access.

If the Voice Video Endpoint does not implement replay-resistant authentication mechanisms for network access, this is a finding.
Fix Text (F-72785r1_fix)
Configure the Voice Video Endpoint to implement replay-resistant authentication mechanisms for network access.