Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-14262 | 5.050 | SV-29955r3_rule | Medium |
Description |
---|
Any nodes’ interface with IPv6 enabled by default presents a potential risk of traffic being transmitted or received without proper risk mitigation strategy and is therefore, a serious security concern. |
STIG | Date |
---|---|
Windows 2008 Member Server Security Technical Implementation Guide | 2016-07-22 |
Check Text ( None ) |
---|
None |
Fix Text (F-62371r2_fix) |
---|
Add the following registry values to the system. To disable IPv6 on all interfaces: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\ Value Name: DisabledComponents Type: REG_DWORD Value: 0xff or 0xffffffff To disable all IPv6 tunneling interfaces: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\ Value Name: DisabledComponents Type: REG_DWORD Value: 0x1 Microsoft updated article 929852 with regard to disabling all IPv6 components, changing the value to 0xff. A value of 0xffffffff results in a 5-second delay in system startup. However, either value can be used to disable all IPv6 components. |