UCF STIG Viewer Logo

Network devices must be configured to ensure passwords are not viewable when displaying configuration information.


Overview

Finding ID Version Rule ID IA Controls Severity
V-3062 NET0600 SV-3062r4_rule High
Description
Many attacks on information systems and network devices are launched from within the network. Hence, it is imperative that all passwords are encrypted so they cannot be intercepted by viewing the console or printout of the configuration.
STIG Date
Perimeter Router Security Technical Implementation Guide 2018-11-28

Details

Check Text ( C-3508r5_chk )
Review the network devices configuration to determine if passwords are viewable.

If passwords are viewable in plaintext, this is a finding.
Fix Text (F-3087r7_fix)
Configure the network devices to ensure passwords are not viewable when displaying configuration information.