VCENTER-000017 - Revoked certificates must be removed from the vCenter Server.

Information

If revoked certificates are not removed from the vCenter Server, the user can be subject to a MiTM attack, which potentially might enable compromise through impersonation with the user's credentials to the vCenter Server system.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

If a site procedure to ensure the monitoring and removal of revoked certificates from the vCenter Server Windows host does not exist, create one. Check the vCenter Server/host for the presence of revoked certificates. Remove all revoked certificates.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_ESXi5_vCenter_Server_V2R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Group-ID|V-39555, Rule-ID|SV-250736r799898_rule, STIG-ID|VCENTER-000017, STIG-Legacy|SV-51413, STIG-Legacy|V-39555, Vuln-ID|V-250736

Plugin: VMware

Control ID: dce83b19fcb8ec37f13fee98b77d41492d70392f4c434c5c55d27009e7f1e04f