CCE-90604-0Platform: cpe:/o:centos:centos:7, cpe:/o:redhat:enterprise_linux:7 | Date: (C)2017-06-29 (M)2023-07-04 |
To set the runtime status of the 'net.ipv6.conf.default.accept_ra' kernel parameter,
run the following command:
Parameter:
[no/yes]
Technical Mechanism:
An illicit router advertisement message could result in a man-in-the-middle attack.
CCSS Severity: | CCSS Metrics: |
CCSS Score : 5.1 | Attack Vector: LOCAL |
Exploit Score: 2.5 | Attack Complexity: LOW |
Impact Score: 2.5 | Privileges Required: NONE |
Severity: MEDIUM | User Interaction: NONE |
Vector: AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L | Scope: UNCHANGED |
| Confidentiality: LOW |
| Integrity: NONE |
| Availability: LOW |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:31020 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:30297 |