DISA STIGS Viewer

Google Android 13 must be configured to disable ad hoc wireless client-to-client connection capability.

Overview

Finding ID Version Rule ID IA Controls Severity
V-254784 GOOG-13-009500 SV-254784r1042505_rule   Medium
Description
Ad hoc wireless client-to-client connections allow mobile devices to communicate with each other directly, circumventing network security policies and making the traffic invisible. This could allow the exposure of sensitive DOD data and increase the risk of downloading and installing malware on the DOD mobile device. SFR ID: FMT_SMF_EXT.1.1/WLAN
STIG Date
Google Android 13 COPE Security Technical Implementation Guide 2024-12-04

Details

Check Text (C-58395r1042503_chk)
This validation procedure is performed on both the management tool and the Google Android device.

On the management tool, in the user restrictions, verify "Wi-Fi Direct" has been set to "Disallow".

On the Google Android device:
1. Open Settings >> Connections >> Wi-Fi.
2. From the hamburger menu, select "Wi-Fi Direct".
3. Verify that "Wi-Fi Direct" cannot be selected.

If on the management tool "Wi-Fi Direct" is not set to "Disallow", or on the Google Android device a Wi-Fi Direct device is listed that can be connected to, this is a finding.
Fix Text (F-58341r1042504_fix)
Configure the Google Android devices to disallow Wi-Fi Direct.

On the management tool, in the user restrictions, set "Wi-Fi Direct" to "Disallow".

Wi-Fi Direct connections and pairing between devices will become unavailable.