CCE-50239-3Platform: cpe:/o:apple:mac_os_14 | Date: (C)2023-11-28 (M)2023-11-28 |
SSH _MUST_ be configured to limit the ciphers to algorithms that are FIPS 140 validated.
FIPS 140-2 is the current standard for validating that mechanisms used to access cryptographic modules utilize authentication that meet federal requirements.
Operating systems utilizing encryption _MUST_ use FIPS validated mechanisms for authenticating to cryptographic modules.
NOTE: /etc/ssh/sshd_config will be automatically modified to its original state following any update or major upgrade to the operating system.
Fix:
Add the following lines in /etc/ssh/sshd_config file:
Ciphers aes256-ctr,aes192-ctr,aes128-ctr
And run the following command:
/bin/launchctl kickstart -k system/com.openssh.sshd
Parameter:
[aes256-ctr,aes192-ctr,aes128-ctr]
Technical Mechanism:
Add the following lines in /etc/ssh/sshd_config file:
Ciphers aes256-ctr,aes192-ctr,aes128-ctr
And run the following command:
/bin/launchctl kickstart -k system/com.openssh.sshd
CCSS Severity: | CCSS Metrics: |
CCSS Score : 8.1 | Attack Vector: NETWORK |
Exploit Score: 2.2 | Attack Complexity: HIGH |
Impact Score: 5.9 | Privileges Required: NONE |
Severity: HIGH | User Interaction: NONE |
Vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H | Scope: UNCHANGED |
| Confidentiality: HIGH |
| Integrity: HIGH |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:94804 |