AIOS-18-010200 - Apple iOS/iPadOS 18 must be configured to disable ad hoc wireless client-to-client connection capability.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Ad hoc wireless client-to-client connections allow mobile devices to communicate with each other directly, circumventing network security policies and making the traffic invisible. This could allow the exposure of sensitive DOD data and increase the risk of downloading and installing malware on the DOD mobile device.

SFRID: FMT_SMF_EXT.1.1/WLAN

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

If the AO has not approved the use of AirDrop for unmanaged data transfer, install a configuration profile to disable the AllowAirDrop control in the management tool. This a supervised-only control.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_iOS-iPadOS_18_V1R1_STIG.zip

Item Details

References: CAT|II, CCI|CCI-002536, Rule-ID|SV-268022r1031202_rule, STIG-ID|AIOS-18-010200, Vuln-ID|V-268022

Plugin: MDM

Control ID: 49cccd3fc9a0eb52c0ac1202ec6e89e1234102f23a7eb93a9e7def28f30d5641