ESXI-70-000083 - The ESXi host OpenSLP service must be disabled.

Information

OpenSLP implements the Service Location Protocol to help CIM clients discover CIM servers over TCP 427. This service is not widely needed and has had vulnerabilities exposed in the past. To reduce attack surface area and following the minimum functionality principal, the OpenSLP service must be disabled unless explicitly needed and approved.

Note: Disabling the OpenSLP service may affect monitoring and third-party systems that use the WBEM DTMF protocols.

Solution

From the vSphere Client go to Hosts and Clusters.

Select the ESXi Host >> Configure >> System >> Services.

Select the 'slpd' service. If the service is started, click 'Stop'.

Click 'Edit Startup Policy...'. Select 'Start and stop manually'. Click 'OK'.

or

From a PowerCLI command prompt while connected to the ESXi host, run the following command:

Get-VMHost | Get-VMHostService | Where {$_.Label -eq 'slpd'} | Set-VMHostService -Policy Off
Get-VMHost | Get-VMHostService | Where {$_.Label -eq 'slpd'} | Stop-VMHostService

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_7-0_Y23M07_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-256435r886086_rule, STIG-ID|ESXI-70-000083, Vuln-ID|V-256435

Plugin: Unix

Control ID: e5603f0ecf9e104dd660ffc8f82eb8e0851287b41017cad3b48ea05912aacfda