WN12-AD-000012-DC - Anonymous access to the root DSE of a non-public directory must be disabled.

Information

Allowing anonymous access to the root DSE data on a directory server provides potential attackers with a number of details about the configuration and data contents of a directory. For example, the namingContexts attribute indicates the directory space contained in the directory; the supportedLDAPVersion attribute indicates which versions of the LDAP protocol the server supports; and the supportedSASLMechanisms attribute indicates the names of supported authentication mechanisms. An attacker with this information may be able to select more precisely targeted attack tools or higher value targets.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Implement network protections to reduce the risk of anonymous access.

Network hardware ports at the site are subject to 802.1x authentication or MAC address restrictions.

Premise firewall or host restrictions prevent access to ports 389, 636, 3268, and 3269 from client hosts not explicitly identified by domain (.mil) or IP address.

Severity Override Guidance: The following network controls allow the finding severity to be downgraded to not a finding since these measures lower the risk associated with anonymous access.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2012_and_2012_R2_DC_V3R7_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|III, CCI|CCI-000366, Rule-ID|SV-226081r794800_rule, STIG-ID|WN12-AD-000012-DC, STIG-Legacy|SV-51186, STIG-Legacy|V-14797, Vuln-ID|V-226081

Plugin: Windows

Control ID: 72af5a08b4a4405201bcdb275f66bad7ab3ec90d29953eef2a4626937c06cb41