GOOG-16-009500 - Google Android 16 must be configured to disable ad hoc wireless client-to-client connection capability.

Information

Ad hoc wireless client-to-client connections allow mobile devices to communicate with each other directly, circumventing network security policies and making the traffic invisible. This could allow the exposure of sensitive DOD data and increase the risk of downloading and installing malware on the DOD mobile device.

SFR ID: FMT_SMF_EXT.1.1/WLAN

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Configure the Google Android devices to disallow Wi-Fi Direct. On the management tool, do the following:

COBO:

1. Find 'User Restrictions' and select 'Set User Restrictions'.
2. Scroll down to 'Disallow Wi-Fi Direct' and toggle that to 'ON'.

COPE:

1. Find 'User Restrictions on Parent' and select 'Set User Restrictions'.
2. Scroll down to 'Disallow Wi-Fi Direct' and toggle that to 'ON'.

Configuration API: DISALLOW_WIFI_DIRECT

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Google_Android_16_Y25M08_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-40, CAT|II, CCI|CCI-002536, Rule-ID|SV-276871r1140405_rule, STIG-ID|GOOG-16-009500, Vuln-ID|V-276871

Plugin: MDM

Control ID: 2201e37ab8f4c291ed2b7d3e29052f60ad9ce5e500d24baf408b8a444d7aa2b2