Check: WN10-SO-000180
Microsoft Windows 10 STIG:
WN10-SO-000180
(in versions v3 r2 through v1 r7)
Title
NTLM must be prevented from falling back to a Null session. (Cat II impact)
Discussion
NTLM sessions that are allowed to fall back to Null (unauthenticated) sessions may gain unauthorized access.
Check Content
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Control\LSA\MSV1_0\ Value Name: allownullsessionfallback Value Type: REG_DWORD Value: 0
Fix Text
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Allow LocalSystem NULL session fallback" to "Disabled".
Additional Identifiers
Rule ID: SV-220934r991589_rule
Vulnerability ID: V-220934
Group Title: SRG-OS-000480-GPOS-00227
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
Implement the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |