Check: WIR0105
WLAN Bridge STIG (STIG):
WIR0105
(in versions v6 r15 through v6 r12)
Title
WLAN SSIDs must be changed from the manufacturer’s default to a pseudo random word that does not identify the unit, base, organization, etc. (Cat III impact)
Discussion
An SSID identifying the unit, site or purpose of the WLAN or is set to the manufacturer default may cause an OPSEC vulnerability.
Check Content
Review device configuration. 1. Obtain the SSID using a wireless scanner or the AP or WLAN controller management software. 2. Verify the name is not meaningful (e.g., site name, product name, room number, etc.) or set to the manufacturer's default value. Mark as a finding if the SSID does not meet the requirement listed above.
Fix Text
Change the SSID to a pseudo random word that does not identify the unit, base, or organization.
Additional Identifiers
Rule ID: SV-15614r1_rule
Vulnerability ID: V-14846
Group Title: Change WLAN SSID default
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |