The Enterprise Voice, Video, and Messaging Endpoint must be configured to implement replay-resistant authentication mechanisms for network access.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-259966 | SRG-NET-000147-VVEP-00101 | SV-259966r953940_rule | CCI-001942 | medium |
| Description | ||||
| A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authenticator and the application validating the user credentials must not be vulnerable to a replay attack. An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous authentication message. A nonprivileged account is any operating system account with authorizations of a nonprivileged user. Techniques used to address this include protocols using nonces (e.g., numbers generated for a specific one time use) or challenges (e.g., TLS, WS_Security). Additional techniques include time-synchronous or challenge-response one-time authenticators. This requirement only applies to components where this is specific to the function of the device or has the concept of an organizational user (e.g., VPN, proxy capability). This does not apply to authentication for the purpose of configuring the device itself (i.e., device management). | ||||
| STIG | Date | |||
| Enterprise Voice, Video, and Messaging Endpoint Security Requirements Guide | 2024-08-02 | |||
Details
Check Text (C-259966r953940_chk)
Verify the Enterprise Voice, Video, and Messaging Endpoint implements replay-resistant authentication mechanisms for network access.
If the Enterprise Voice, Video, and Messaging Endpoint does not implement replay-resistant authentication mechanisms for network access, this is a finding.
Fix Text (F-63604r948864_fix)
Configure the Enterprise Voice, Video, and Messaging Endpoint to implement replay-resistant authentication mechanisms for network access.