Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-14262 | 5.050 | SV-25272r1_rule | ECSC-1 | Medium |
Description |
---|
Any nodes’ interface with IPv6 enabled by default presents a potential risk of traffic being transmitted or received without proper risk mitigation strategy and therefore a serious security concern. |
STIG | Date |
---|---|
Windows 7 Security Technical Implementation Guide | 2012-08-22 |
Check Text ( C-35156r1_chk ) |
---|
Prior to transition, IPv6 will be disabled on all interfaces. If the following registry value doesn’t exist or is not configured as specified, then this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Subkey: System\CurrentControlSet\Services\Tcpip6\Parameters Value Name: DisabledComponents Type: REG_DWORD Value: 0xffffffff Discrepancies in documentation have resulted in several changes to this requirement. See Microsoft article 929852 for details of the DisabledComponents registry value. Documentable: If disabling IPv6 on all interfaces prior to the transition to supporting IPv6 causes issues with necessary applications or services, document this with the IAO. |
Fix Text (F-30403r1_fix) |
---|
To disable IPv6 on all interfaces, configure the following registry key: Registry Hive: HKEY_LOCAL_MACHINE Subkey: System\CurrentControlSet\Services\Tcpip6\Parameters Value Name: DisabledComponents Type: REG_DWORD Value: 0xffffffff |