UCF STIG Viewer Logo

The network element must employ automated mechanisms to enforce strict adherence to protocol format.


Overview

Finding ID Version Rule ID IA Controls Severity
V-27414 SRG-NET-000200 SV-34722r1_rule Medium
Description
Crafted packets not conforming to Institute of Electrical and Electronics Engineers (IEEE) standards can be used by malicious people to exploit a host’s protocol stack to create a Denial of Service (DoS) or force a device reset, bypass security gateway filtering, or compromise a vulnerable device. It is imperative these packets are recognized and discarded at the network perimeter.
STIG Date
Network Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None