Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-206763 | SRG-NET-000147-VVEP-00015 | SV-206763r604140_rule | Medium |
Description |
---|
A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authenticator and the application validating the user credentials must not be vulnerable to a replay attack. An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous authentication message. Voice video endpoints often use passwords or PINs that can be easily exploited. This requirement only applies to components where this is specific to the function of the device or has the concept of an organizational user. This does not apply to authentication for the purpose of configuring the device itself (i.e., device management). |
STIG | Date |
---|---|
Voice Video Endpoint Security Requirements Guide | 2020-12-04 |
Check Text ( C-7019r363812_chk ) |
---|
Verify the Voice Video Endpoint implements replay-resistant authentication mechanisms for network access. If the Voice Video Endpoint does not implement replay-resistant authentication mechanisms for network access, this is a finding. |
Fix Text (F-7019r363813_fix) |
---|
Configure the Voice Video Endpoint to implement replay-resistant authentication mechanisms for network access. |