SRG-OS-000157-ESXI5 - The SSH client must be configured to not use CBC-based ciphers.

Information

The Cipher-Block Chaining (CBC) mode of encryption as implemented in the SSHv2 protocol is vulnerable to chosen plain text attacks and must not be used.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Disable lock down mode.
Enable the ESXi Shell.

Edit the SSH client configuration and add/modify the 'Ciphers' configuration (examples of disallowed ciphers: aes128-cbc, aes192-cbc, aes256-cbc, arcfour256blowfish-cbc, cast128-cbc, 3des-cbc).
# vi /etc/ssh/ssh_config

Re-enable lock down mode.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_ESXi5_Server_V2R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Group-ID|V-39402, Rule-ID|SV-250640r798919_rule, STIG-ID|SRG-OS-000157-ESXI5, STIG-Legacy|SV-51260, STIG-Legacy|V-39402, Vuln-ID|V-250640

Plugin: VMware

Control ID: a00ef9a542883e9f8e3682f7e1775c7c83d0b87a3c9952f883847319b69932a5