UCF STIG Viewer Logo

The Voice Video Endpoint must implement replay-resistant authentication mechanisms for network access.


Overview

Finding ID Version Rule ID IA Controls Severity
V-206763 SRG-NET-000147-VVEP-00015 SV-206763r604140_rule Medium
Description
A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authenticator and the application validating the user credentials must not be vulnerable to a replay attack. An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous authentication message. Voice video endpoints often use passwords or PINs that can be easily exploited. This requirement only applies to components where this is specific to the function of the device or has the concept of an organizational user. This does not apply to authentication for the purpose of configuring the device itself (i.e., device management).
STIG Date
Voice Video Endpoint Security Requirements Guide 2020-12-04

Details

Check Text ( C-7019r363812_chk )
Verify the Voice Video Endpoint implements replay-resistant authentication mechanisms for network access.

If the Voice Video Endpoint does not implement replay-resistant authentication mechanisms for network access, this is a finding.
Fix Text (F-7019r363813_fix)
Configure the Voice Video Endpoint to implement replay-resistant authentication mechanisms for network access.