CAT|I

Title

DISA Severity Level 1

Description

Any vulnerability, the exploitation of which will directly and immediately result in loss of Confidentiality, Availability, or Integrity.

Reference Item Details

Category: Severity Level

Audit Items

View all Reference Audit Items

NamePluginAudit Name
1.1 JBoss Enterprise Application Platform should be a vendor supported versionUnixRedhat JBoss EAP 5.x
1.1/1.2 - JBoss Enterprise Application Platform/Ensure Java Runtime Environment in use is a supported versionUnixRedhat JBoss EAP 5.x
1.006 - Users with Administrative privilege are not documented or do not have separate accounts for administrative duties.WindowsDISA Windows Vista STIG v6r41
1.006-01 - Policy must require that administrative user accounts not be used with applications that access the internet.WindowsDISA Windows Vista STIG v6r41
1.23 snmp-adaptor.sar must not be deployed - 'JBOSS_HOME/server/@[email protected]/deploy/snmp-adaptor.sar'UnixRedhat JBoss EAP 5.x
2.005 - Systems must be at supported service packs (SP) or releases levels.WindowsDISA Windows Vista STIG v6r41
2.008 - Local volumes are not formatted using NTFS.WindowsDISA Windows Vista STIG v6r41
2.022 - Disallow AutoPlay/Autorun from Autorun.infWindowsDISA Windows Vista STIG v6r41
2.023 - Standard user accounts must only have Read permissions to the Winlogon registry key.WindowsDISA Windows Vista STIG v6r41
3.1 Ensure JMX Console is either secured or removed - 'java:/jaas/jmx-console = true'UnixRedhat JBoss EAP 5.x
3.1 Ensure JMX Console is either secured or removed - 'java:/jaas/jmx-console = true'UnixRedhat JBoss EAP 5.x
3.1 Ensure JMX Console is either secured or removed - 'java:/jaas/jmx-console = true' - jmx-console.warUnixRedhat JBoss EAP 5.x
3.2 Ensure Web Console is either secured or removed - 'java:/jaas/jmx-console = true'UnixRedhat JBoss EAP 5.x
3.2 Ensure Web Console is either secured or removed - 'JBOSS_HOME/server/@[email protected]/deploy/admin-console.war'UnixRedhat JBoss EAP 5.x
3.3 Ensure Admin Console is either secured or removedUnixRedhat JBoss EAP 5.x
3.3 Ensure Admin Console is either secured or removed - 'java:/jaas/jmx-console = true'UnixRedhat JBoss EAP 5.x
3.3 Ensure Admin Console is either secured or removed - 'JBOSS_HOME/server/@[email protected]/deploy/management'UnixRedhat JBoss EAP 5.x
3.4 The JMXInvokerServlet servlet must be secured against web attacksUnixRedhat JBoss EAP 5.x
3.4 The JMXInvokerServlet servlet must be secured against web attacks - 'http-method,'POST' = false'UnixRedhat JBoss EAP 5.x
3.4 The JMXInvokerServlet servlet must be secured against web attacks - 'http-method,GET = false'UnixRedhat JBoss EAP 5.x
3.5 JMXInvokerServlet configuration - 'usersProperties = props/jmx-console-users.properties'UnixRedhat JBoss EAP 5.x
3.5 JMXInvokerServlet servlet configuration - 'rolesProperties = props/jmx-console-roles.properties'UnixRedhat JBoss EAP 5.x
3.5 The JMXInvokerServlet servlet must be configured to prevent unprivileged access using authenticationUnixRedhat JBoss EAP 5.x
3.5 The JMXInvokerServlet servlet must be configured to prevent unprivileged access using authentication - 'java:/jaas/jmx-console = true'UnixRedhat JBoss EAP 5.x
3.6 JMXInvokerServlet configuration - 'org.jboss.jmx.connector.invoker.RolesAuthorization = true'UnixRedhat JBoss EAP 5.x
3.6 JMXInvokerServlet configuration - 'rolesProperties = props/jmx-console-roles.properties'UnixRedhat JBoss EAP 5.x
3.6 JMXInvokerServlet configuration - 'usersProperties = props/jmx-console-users.properties'UnixRedhat JBoss EAP 5.x
3.6 The JMXInvokerServlet servlet must be configured to prevent unprivileged access using authenticationUnixRedhat JBoss EAP 5.x
3.018 - Anonymous shares are not restricted. - RestrictAnonymousWindowsDISA Windows Vista STIG v6r41
3.018 - Anonymous shares are not restricted. - RestrictAnonymousSAMWindowsDISA Windows Vista STIG v6r41
3.030 - Anonymous access to the registry must be restricted.WindowsDISA Windows Vista STIG v6r41
3.031 - The Send download LanMan compatible password option is not set to Send NTLMv2 response only\refuse LM.WindowsDISA Windows Vista STIG v6r41
3.049 - The Recovery Console option is set to permit automatic logon to the system.WindowsDISA Windows Vista STIG v6r41
3.059 - The system is configured to autoplay removable media.WindowsDISA Windows Vista STIG v6r41
3.061 - Unencrypted remote access is permitted to system services.WindowsDISA Windows Vista STIG v6r41
3.062 - Anonymous SID/Name translation is allowed.WindowsDISA Windows Vista STIG v6r41
3.063 - Unauthorized named pipes are accessible with anonymous credentials.WindowsDISA Windows Vista STIG v6r41
3.064 - Unauthorized registry paths are remotely accessible.WindowsDISA Windows Vista STIG v6r41
3.065 - Unauthorized shares can be accessed anonymously.WindowsDISA Windows Vista STIG v6r41
3.068 - Solicited Remote Assistance is allowed.WindowsDISA Windows Vista STIG v6r41
3.073 - The system must be configured to prevent the storage of the LAN Manager hash of passwords.WindowsDISA Windows Vista STIG v6r41
3.108 - Unauthorized registry paths and sub-paths are remotely accessible.WindowsDISA Windows Vista STIG v6r41
3.116 - Named Pipes and Shares can be accessed anonymously.WindowsDISA Windows Vista STIG v6r41
4.005 - Unapproved Users have access to Debug programs.WindowsDISA Windows Vista STIG v6r41
4.009 - Unauthorized users are granted right to Act as part of the operating system.WindowsDISA Windows Vista STIG v6r41
4.017 - DOD information system access does not require the use of a password.WindowsDISA Windows Vista STIG v6r41
4.027 - Only administrators responsible for the system must have Administrator rights on the system.WindowsDISA Windows Vista STIG v6r41
4.036 - The use of local accounts with blank passwords is not restricted to console logons only.WindowsDISA Windows Vista STIG v6r41
5.005 - Installed FTP server is configured to allow access to the system drive.WindowsDISA Windows Vista STIG v6r41
5.007 - An approved, up-to-date, DoD antivirus program must be installed and used.WindowsDISA Windows Vista STIG v6r41