CCE-90717-0Platform: cpe:/o:centos:centos:7, cpe:/o:redhat:enterprise_linux:7 | Date: (C)2017-06-29 (M)2023-07-04 |
By default, inbound connections to SSH's port are allowed. If
the SSH server is not being used, this exception should be removed from the
firewall configuration.
Edit the files '/etc/sysconfig/iptables' and '/etc/sysconfig/ip6tables'
(if IPv6 is in use). In each file, locate and delete the line:
'-A INPUT -m state -state NEW -m tcp -p tcp -dport 22 -j ACCEPT'
This is unusual, as SSH is a common method for encrypted and authenticated
remote access.
Parameter:
[yes/no]
Technical Mechanism:
If inbound SSH connections are not expected, disallowing access to the SSH port will
avoid possible exploitation of the port by an attacker.
CCSS Severity: | CCSS Metrics: |
CCSS Score : 4.2 | Attack Vector: NETWORK |
Exploit Score: 1.6 | Attack Complexity: HIGH |
Impact Score: 2.5 | Privileges Required: LOW |
Severity: MEDIUM | User Interaction: NONE |
Vector: AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L | Scope: UNCHANGED |
| Confidentiality: LOW |
| Integrity: NONE |
| Availability: LOW |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:31131 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:30408 |