Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-14262 | 5.050 | SV-29955r2_rule | ECSC-1 | Medium |
Description |
---|
Any nodes’ interface with IPv6 enabled by default presents a potential risk of traffic being transmitted or received without proper risk mitigation strategy and is therefore, a serious security concern. |
STIG | Date |
---|---|
Windows 2008 Member Server Security Technical Implementation Guide | 2014-07-03 |
Check Text ( None ) |
---|
None |
Fix Text (F-53909r1_fix) |
---|
Add the following registry keys to the system. To disable IPv6 on all interfaces: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\Tcpip6\Parameters\ Value Name: DisabledComponents Type: REG_DWORD Value: 0xffffffff To disable all IPv6 tunneling interfaces: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \System\CurrentControlSet\Services\Tcpip6\Parameters\ Value Name: DisabledComponents Type: REG_DWORD Value: 0x1 Discrepancies in documentation have resulted in several changes to this requirement. See Microsoft article 929852 for details of the DisabledComponents registry value. |