CCE-95520-3Platform: cpe:/o:amazon:linux:2, cpe:/o:centos:centos:7, cpe:/o:oracle:linux:7, cpe:/o:oracle:linux:8, cpe:/o:redhat:enterprise_linux:7, cpe:/o:redhat:enterprise_linux:8, cpe:/o:redhat:enterprise_linux:9 | Date: (C)2021-09-28 (M)2023-07-04 |
The use of wireless networking can introduce many different attack vectors into the organization's network. Common attack vectors such as malicious association and ad hoc networks will allow an attacker to spoof a wireless access point (AP), allowing validated systems to connect to the malicious AP and enabling the attacker to monitor and record network traffic. These malicious APs can also serve to create a man-in-the-middle attack or be used to create a denial of service to valid network resources.
Parameter:
[Yes/No]
Technical Mechanism:
Configure the system to disable all wireless network interfaces with the following command:
#nmcli radio wifi off
CCSS Severity: | CCSS Metrics: |
CCSS Score : 9.1 | Attack Vector: NETWORK |
Exploit Score: 3.9 | Attack Complexity: LOW |
Impact Score: 5.2 | Privileges Required: NONE |
Severity: CRITICAL | User Interaction: NONE |
Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H | Scope: UNCHANGED |
| Confidentiality: HIGH |
| Integrity: NONE |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:74476 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:74475 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:74478 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:74477 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:74473 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:74474 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:84299 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:74472 |