Check: SRG-APP-000223-UEM-000134
Unified Endpoint Management Server SRG:
SRG-APP-000223-UEM-000134
(in versions v2 r3 through v1 r1)
Title
The UEM server must recognize only system-generated session identifiers. (Cat II impact)
Discussion
Applications utilize sessions and session identifiers to control application behavior and user access. If an attacker can guess the session identifier, or can inject or manually insert session information, the session may be compromised. Unique session IDs address man-in-the-middle attacks, including session hijacking or insertion of false information into a session. If the attacker is unable to identify or guess the session information related to pending application traffic, they will have more difficulty in hijacking the session or otherwise manipulating valid sessions. This requirement focuses on communications protection for the application session rather than for the network packet. This requirement applies to applications that utilize communications sessions. This includes, but is not limited to, web-based applications and Service-Oriented Architectures (SOA).
Check Content
Verify the UEM server recognizes only system-generated session identifiers. If the UEM server does not recognize only system-generated session identifiers, this is a finding.
Fix Text
Configure the UEM server to recognize only system-generated session identifiers.
Additional Identifiers
Rule ID: SV-234407r1043180_rule
Vulnerability ID: V-234407
Group Title: SRG-APP-000223
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001664 |
Recognize only session identifiers that are system-generated. |
Controls
Number | Title |
---|---|
SC-23(3) |
Unique Session Identifiers with Randomization |