UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system administrator will ensure SSH version 2 is implemented.


Overview

Finding ID Version Rule ID IA Controls Severity
V-14717 NET1647 SV-15459r3_rule ECSC-1 Medium
Description
SSH Version 1 is a protocol that has never been defined in a standard. Since SSH-1 has inherent design flaws which make it vulnerable to, e.g., man-in-the-middle attacks, it is now generally considered obsolete and should be avoided by explicitly disabling fallback to SSH-1.
STIG Date
WLAN Bridge Security Technical Implementation Guide 2011-10-10

Details

Check Text ( C-12924r1_chk )
Base Procedure: Review the configuration and verify controls are in place to ensure the use of SSH v2.
Fix Text (F-14184r1_fix)
Implement version 2 of SSH.