[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

243238

 
 

909

 
 

192833

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-90717-0

Platform: cpe:/o:centos:centos:7, cpe:/o:redhat:enterprise_linux:7Date: (C)2017-06-29   (M)2023-07-04



By default, inbound connections to SSH's port are allowed. If the SSH server is not being used, this exception should be removed from the firewall configuration. Edit the files '/etc/sysconfig/iptables' and '/etc/sysconfig/ip6tables' (if IPv6 is in use). In each file, locate and delete the line: '-A INPUT -m state -state NEW -m tcp -p tcp -dport 22 -j ACCEPT' This is unusual, as SSH is a common method for encrypted and authenticated remote access.


Parameter:

[yes/no]


Technical Mechanism:

If inbound SSH connections are not expected, disallowing access to the SSH port will avoid possible exploitation of the port by an attacker.

CCSS Severity:CCSS Metrics:
CCSS Score : 4.2Attack Vector: NETWORK
Exploit Score: 1.6Attack Complexity: HIGH
Impact Score: 2.5Privileges Required: LOW
Severity: MEDIUMUser Interaction: NONE
Vector: AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:LScope: UNCHANGED
 Confidentiality: LOW
 Integrity: NONE
 Availability: LOW
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:31131
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:30408


OVAL    2
oval:org.secpod.oval:def:31131
oval:org.secpod.oval:def:30408
XCCDF    2
xccdf_org.secpod_benchmark_general_CENTOS_7
xccdf_org.secpod_benchmark_general_RHEL_7

© SecPod Technologies