[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

242976

 
 

909

 
 

192814

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-90611-5

Platform: cpe:/o:centos:centos:7,cpe:/o:redhat:enterprise_linux:7Date: (C)2017-06-29   (M)2023-07-04



To set the default policy to DROP (instead of ACCEPT) for the built-in INPUT chain which processes incoming packets, add or correct the following line in '/etc/sysconfig/ip6tables': ':INPUT DROP [0:0]' If changes were required, reload the ip6tables rules: '$ sudo service ip6tables reload'


Parameter:

[drop_incoming_pkt/accept_incoming_pkt]


Technical Mechanism:

In 'ip6tables', the default policy is applied only after all the applicable rules in the table are examined for a match. Setting the default policy to 'DROP' implements proper design for a firewall, i.e. any packets which are not explicitly permitted should not be accepted.

CCSS Severity:CCSS Metrics:
CCSS Score : 9.8Attack Vector: NETWORK
Exploit Score: 3.9Attack Complexity: LOW
Impact Score: 5.9Privileges Required: NONE
Severity: CRITICALUser Interaction: NONE
Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HScope: UNCHANGED
 Confidentiality: HIGH
 Integrity: HIGH
 Availability: HIGH
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:31026
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:30303


OVAL    2
oval:org.secpod.oval:def:30303
oval:org.secpod.oval:def:31026
XCCDF    2
xccdf_org.secpod_benchmark_general_CENTOS_7
xccdf_org.secpod_benchmark_general_RHEL_7

© SecPod Technologies