UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

WLAN SSIDs must be changed from the manufacturer’s default to a pseudo random word that does not identify the unit, base, organization, etc.


Overview

Finding ID Version Rule ID IA Controls Severity
V-14846 WIR0105 SV-15614r1_rule Low
Description
An SSID identifying the unit, site or purpose of the WLAN or is set to the manufacturer default may cause an OPSEC vulnerability.
STIG Date
WLAN Access Point (Internet Gateway Only Connection) Security Technical Implementation Guide (STIG) 2017-12-07

Details

Check Text ( C-13276r1_chk )
Review device configuration.
1. Obtain the SSID using a wireless scanner or the AP or WLAN controller management software.
2. Verify the name is not meaningful (e.g., site name, product name, room number, etc.) or set to the manufacturer's default value.

Mark as a finding if the SSID does not meet the requirement listed above.
Fix Text (F-34142r1_fix)
Change the SSID to a pseudo random word that does not identify the unit, base, or organization.