[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-50388-8

Platform: cpe:/o:apple:mac_os_14Date: (C)2024-04-23   (M)2024-04-23



Enterprise networks may be required to audit all network traffic by policy; therefore, iCloud Private Relay must be disabled. Network administrators can also prevent the use of this feature by blocking DNS resolution of mask.icloud.com and mask-h2.icloud.com. Audit: Verify the macOS system is configured to disable the iCloud Private Relay with the following command: /usr/bin/osascript -l JavaScript << EOS $.NSUserDefaults.alloc.initWithSuiteName('com.apple.applicationaccess')\ .objectForKey('allowCloudPrivateRelay').js EOS If the result is not "false", this is a finding. Remediation: Configure the macOS system to disable TouchID for unlocking the device by installing the "com.apple.applicationaccess" configuration profile with 'allowCloudPrivateRelay' key set to false


Parameter:

[Yes/No]


Technical Mechanism:

Configure the macOS system to disable TouchID for unlocking the device by installing the "com.apple.applicationaccess" configuration profile with 'allowCloudPrivateRelay' key set to false

CCSS Severity:CCSS Metrics:
CCSS Score : 5.1Attack Vector: LOCAL
Exploit Score: 1.4Attack Complexity: HIGH
Impact Score: 3.6Privileges Required: NONE
Severity: MEDIUMUser Interaction: NONE
Vector: AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NScope: UNCHANGED
 Confidentiality: HIGH
 Integrity: NONE
 Availability: NONE
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:99387


OVAL    1
oval:org.secpod.oval:def:99387
XCCDF    1
xccdf_org.secpod_benchmark_general_Mac_OS_14

© SecPod Technologies