Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-5613 | NET1646 | SV-5613r4_rule | ECSC-1 | Medium |
Description |
---|
An attacker may attempt to connect to the device using SSH by guessing the authentication method and authentication key or shared secret. Setting the authentication retry to 3 or less strengthens against a Brute Force attack. |
STIG | Date |
---|---|
Perimeter Router Security Technical Implementation Guide | 2015-07-01 |
Check Text ( C-3538r8_chk ) |
---|
Review the configuration and verify the number of unsuccessful SSH logon attempts is set at 3. If the device is not configured to reset unsuccessful SSH logon attempts at 3, this is a finding. |
Fix Text (F-5524r9_fix) |
---|
Configure the network device to require a maximum number of unsuccessful SSH logon attempts at 3. |