The Enterprise Voice, Video, and Messaging Endpoint must be configured to implement replay-resistant authentication mechanisms for network access.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
---|---|---|---|---|---|---|
medium | V-259966 | SRG-NET-000147 | SRG-NET-000147-VVEP-00101 | SV-259966r953940_rule | 2024-08-02 | 1 |
Description |
---|
A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authenticator and the application validating the user credentials must not be vulnerable to a replay attack. An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous authentication message. A nonprivileged account is any operating system account with authorizations of a nonprivileged user. Techniques used to address this include protocols using nonces (e.g., numbers generated for a specific one time use) or challenges (e.g., TLS, WS_Security). Additional techniques include time-synchronous or challenge-response one-time authenticators. This requirement only applies to components where this is specific to the function of the device or has the concept of an organizational user (e.g., VPN, proxy capability). This does not apply to authentication for the purpose of configuring the device itself (i.e., device management). |
ℹ️ Check |
---|
Verify the Enterprise Voice, Video, and Messaging Endpoint implements replay-resistant authentication mechanisms for network access. If the Enterprise Voice, Video, and Messaging Endpoint does not implement replay-resistant authentication mechanisms for network access, this is a finding. |
✔️ Fix |
---|
Configure the Enterprise Voice, Video, and Messaging Endpoint to implement replay-resistant authentication mechanisms for network access. |