Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-5612 | NET1645 | SV-5612r2_rule | ECSC-1 | Medium |
Description |
---|
An attacker may attempt to connect to the device using SSH by guessing the authentication method, encryption algorithm, and keys. Limiting the amount of time allowed for authenticating and negotiating the SSH session reduces the window of opportunity for the malicious user attempting to make a connection to the network element. |
STIG | Date |
---|---|
WLAN Bridge Security Technical Implementation Guide (STIG) | 2013-03-14 |
Check Text ( C-3534r4_chk ) |
---|
Review the configuration and verify the timeout is set for 60 seconds or less. The SSH service terminates the connection if protocol negotiation (that includes user authentication) is not complete within this timeout period. |
Fix Text (F-5523r4_fix) |
---|
Configure the network element so it will require a secure shell timeout of 60 seconds or less. |