Vulnerability ID Severity Message
V-254247 Medium Systems at unsupported servicing levels will not receive security updates for...
V-205849 High Systems at unsupported servicing levels will not receive security updates for...
V-253263 High Windows 11 is maintained by Microsoft at servicing levels for specific period...
V-220706 High Windows 10 is maintained by Microsoft at servicing levels for specific period...
V-254355 Medium Enumeration of administrator accounts when elevating can provide part of the ...
V-205714 Medium Enumeration of administrator accounts when elevating can provide part of the ...
V-253391 Medium Enumeration of administrator accounts when elevating can provide part of the ...
V-220832 Medium Enumeration of administrator accounts when elevating can provide part of the ...
V-205751 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-254289 Medium The longer a password is in use, the greater the opportunity for someone to g...
V-205659 Medium The longer a password is in use, the greater the opportunity for someone to g...
V-253301 Medium The longer a password is in use, the greater the opportunity for someone to g...
V-220743 Medium The longer a password is in use, the greater the opportunity for someone to g...
V-254447 Medium The built-in administrator account is a well-known account subject to attack....
V-205909 Medium The built-in administrator account is a well-known account subject to attack....
V-253435 Medium The built-in administrator account is a well-known account subject to attack....
V-220911 Medium The built-in administrator account is a well-known account subject to attack....
V-254291 Medium Information systems not protected with strong password schemes (including pas...
V-205662 Medium Information systems not protected with strong password schemes (including pas...
V-253303 Medium Information systems not protected with strong password schemes (including pas...
V-220745 Medium Information systems not protected with strong password schemes (including pas...
V-254290 Medium Permitting passwords to be changed in immediate succession within the same da...
V-205656 Medium Permitting passwords to be changed in immediate succession within the same da...
V-253302 Medium Permitting passwords to be changed in immediate succession within the same da...
V-220744 Medium Permitting passwords to be changed in immediate succession within the same da...
V-253385 Low Some features may communicate with the vendor, sending system information or ...
V-220826 Low Some features may communicate with the vendor, sending system information or ...
V-254351 Low Some features may communicate with the vendor, sending system information or ...
V-205691 Low Some features may communicate with the vendor, sending system information or ...
V-254448 Medium The built-in guest account is a well-known user account on all Windows system...
V-205910 Medium The built-in guest account is a well-known user account on all Windows system...
V-220912 Medium The built-in guest account is a well-known user account on all Windows system...
V-253436 Medium The built-in guest account is a well-known user account on all Windows system...
V-254424 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-254438 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-205670 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-205675 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-220971 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-253494 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-254440 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-205748 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-220973 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-253496 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-254426 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-205745 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-205908 High An account without a password can allow unauthorized access to a system as on...
V-254446 High An account without a password can allow unauthorized access to a system as on...
V-220910 Medium An account without a password can allow unauthorized access to a system as on...
V-253434 Medium An account without a password can allow unauthorized access to a system as on...
V-254429 Medium A compromised local administrator account can provide means for an attacker t...
V-205715 Medium A compromised local administrator account can provide means for an attacker t...
V-253357 Medium A compromised local administrator account can provide means for an attacker t...
V-220799 Medium A compromised local administrator account can provide means for an attacker t...
V-253432 Medium The built-in administrator account is a well-known account subject to attack....
V-220908 Medium The built-in administrator account is a well-known account subject to attack....
V-254445 Medium A system faces an increased vulnerability threat if the built-in guest accoun...
V-205709 Medium A system faces an increased vulnerability threat if the built-in guest accoun...
V-253433 Medium A system faces an increased vulnerability threat if the built-in guest accoun...
V-220909 Medium A system faces an increased vulnerability threat if the built-in guest accoun...
V-254250 High The ability to set access permissions and auditing is critical to maintaining...
V-205663 High The ability to set access permissions and auditing is critical to maintaining...
V-253265 High The ability to set access permissions and auditing is critical to maintaining...
V-220708 High The ability to set access permissions and auditing is critical to maintaining...
V-254372 Medium Indexing of encrypted files may expose sensitive data. This setting prevents ...
V-205694 Medium Indexing of encrypted files may expose sensitive data. This setting prevents ...
V-253409 Medium Indexing of encrypted files may expose sensitive data. This setting prevents ...
V-220855 Medium Indexing of encrypted files may expose sensitive data. This setting prevents ...
V-254494 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-253483 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-220960 Medium Inappropriate granting of user rights can provide system, administrative, and...
V-254317 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-205840 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-253324 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-220766 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-254285 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-205795 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-253297 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-220739 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-254342 Medium An exportable version of credentials is provided to remote hosts when using c...
V-205863 Medium An exportable version of credentials is provided to remote hosts when using c...
V-253368 Medium An exportable version of credentials is provided to remote hosts when using c...
V-220810 Medium An exportable version of credentials is provided to remote hosts when using c...
V-254376 Medium Windows can be configured to automatically sign the user back in after a Wind...
V-205925 Medium Windows can be configured to automatically sign the user back in after a Wind...
V-253413 Medium Windows can be configured to automatically sign the user back in after a Wind...
V-220859 Medium Windows can be configured to automatically sign the user back in after a Wind...
V-260469 High A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, ca...
V-254292 Medium The use of complex passwords increases their strength against attack. The bui...
V-205652 Medium The use of complex passwords increases their strength against attack. The bui...
V-253304 Medium The use of complex passwords increases their strength against guessing and br...
V-260650 High Use of weak or untested encryption algorithms undermines the purposes of util...
V-220746 Medium The use of complex passwords increases their strength against guessing and br...
V-254287 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-205630 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-253299 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-220741 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-254257 Medium The lack of password protection enables anyone to gain access to the informat...
V-205700 Medium The lack of password protection enables anyone to gain access to the informat...
V-254293 High Storing passwords using reversible encryption is essentially the same as stor...
V-205653 High Storing passwords using reversible encryption is essentially the same as stor...
V-253305 High Storing passwords using reversible encryption is essentially the same as stor...
V-220747 High Storing passwords using reversible encryption is essentially the same as stor...
V-254453 Medium Computer account passwords are changed automatically on a regular basis. Disa...
V-205815 Medium Computer account passwords are changed automatically on a regular basis. Disa...
V-253441 Low Computer account passwords are changed automatically on a regular basis. Disa...
V-220917 Low Computer account passwords are changed automatically on a regular basis. Disa...
V-254286 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-205629 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-253298 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-220740 Medium The account lockout feature, when enabled, prevents brute-force password atta...
V-254483 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-205716 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-254482 Medium UAC is a security mechanism for limiting the elevation of privileges, includi...
V-205811 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-253468 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-220944 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-254485 Medium UAC is a security mechanism for limiting the elevation of privileges, includi...
V-205812 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-253471 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-220947 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-254488 Medium UAC is a security mechanism for limiting the elevation of privileges, includi...
V-205813 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-253474 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-220950 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-254486 Medium UAC is a security mechanism for limiting the elevation of privileges, includi...
V-205718 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-253472 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-220948 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-254489 Medium UAC is a security mechanism for limiting the elevation of privileges, includi...
V-205720 Medium UAC is a security mechanism for limiting the elevation of privileges, includi...
V-253475 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-220951 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-254484 Medium UAC is a security mechanism for limiting the elevation of privileges, includi...
V-205717 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-253469 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-220945 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-254487 Medium UAC is a security mechanism for limiting the elevation of privileges, includi...
V-205719 Medium UAC is a security mechanism for limiting the elevation of privileges, includi...
V-253473 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-220949 Medium User Account Control (UAC) is a security mechanism for limiting the elevation...
V-254349 Medium A system that does not require authentication when resuming from sleep may pr...
V-205867 Medium A system that does not require authentication when resuming from sleep may pr...
V-253380 Medium Authentication must always be required when accessing a system. This setting ...
V-220821 Medium Authentication must always be required when accessing a system. This setting ...
V-254350 Medium A system that does not require authentication when resuming from sleep may pr...
V-205868 Medium A system that does not require authentication when resuming from sleep may pr...
V-253381 Medium Authentication must always be required when accessing a system. This setting ...
V-220822 Medium Authentication must always be required when accessing a system. This setting ...
V-254479 Medium If the private key is discovered, an attacker can use the key to authenticate...
V-205651 Medium If the private key is discovered, an attacker can use the key to authenticate...
V-254341 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-205638 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-220809 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-253367 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-254299 Medium Protecting audit information also includes identifying and protecting the too...
V-205731 Medium Protecting audit information also includes identifying and protecting the too...
V-254358 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-205796 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-253337 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-220779 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-254359 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-205797 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-253338 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-220780 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-254360 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-205798 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-253339 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-220781 Medium Inadequate log size will cause the log to fill up quickly. This may prevent a...
V-254449 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-205644 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-253437 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-220913 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-254297 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-205641 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-253341 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-220783 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-254298 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-205642 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-253342 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-220784 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-254352 High Allowing AutoPlay to execute may introduce malicious code to a system. AutoPl...
V-205804 High Allowing AutoPlay to execute may introduce malicious code to a system. AutoPl...
V-253386 High Allowing autoplay to execute may introduce malicious code to a system. Autopl...
V-220827 High Allowing autoplay to execute may introduce malicious code to a system. Autopl...
V-254354 High Allowing AutoPlay to execute may introduce malicious code to a system. AutoPl...
V-205806 High Allowing AutoPlay to execute may introduce malicious code to a system. AutoPl...
V-253388 High Allowing autoplay to execute may introduce malicious code to a system. Autopl...
V-220829 High Allowing autoplay to execute may introduce malicious code to a system. Autopl...
V-254353 High Allowing AutoRun commands to execute may introduce malicious code to a system...
V-205805 High Allowing AutoRun commands to execute may introduce malicious code to a system...
V-253387 High Allowing autorun commands to execute may introduce malicious code to a system...
V-220828 Medium Allowing autorun commands to execute may introduce malicious code to a system...
V-205624 Medium If temporary user accounts remain active when no longer needed or for an exce...
V-254334 Medium When the WDigest Authentication protocol is enabled, plain-text passwords are...
V-205687 Medium When the WDigest Authentication protocol is enabled, plain-text passwords are...
V-253358 Medium When the WDigest Authentication protocol is enabled, plain text passwords are...
V-220800 Medium When the WDigest Authentication protocol is enabled, plain text passwords are...
V-254500 High Inappropriate granting of user rights can provide system, administrative, and...
V-205757 High Inappropriate granting of user rights can provide system, administrative, and...
V-253490 High Inappropriate granting of user rights can provide system, administrative, and...
V-220967 High Inappropriate granting of user rights can provide system, administrative, and...
V-254417 Medium WN22-DC-000330
V-205876 Medium Enabling this setting on all domain controllers in a domain prevents domain m...
V-254416 Medium Unsigned network traffic is susceptible to man-in-the-middle attacks, where a...
V-205820 Medium Unsigned network traffic is susceptible to man-in-the-middle attacks, where a...
V-254391 High Improper access permissions for directory data-related files could allow unau...
V-254392 High Improper access permissions for directory data files could allow unauthorized...
V-205740 High Improper access permissions for directory data files could allow unauthorized...
V-254427 Medium The krbtgt account acts as a service account for the Kerberos Key Distributio...
V-205877 Medium The krbtgt account acts as a service account for the Kerberos Key Distributio...
V-254441 High Credential Guard uses virtualization-based security to protect data that coul...
V-205907 High Credential Guard uses virtualization-based security to protect data that coul...
V-253370 High Credential Guard uses virtualization-based security to protect information th...
V-220812 High Credential Guard uses virtualization based security to protect information th...
V-253447 Low The default Windows configuration caches the last logon credentials for users...
V-220923 Low The default Windows configuration caches the last logon credentials for users...
V-254432 Medium The default Windows configuration caches the last logon credentials for users...
V-205906 Medium The default Windows configuration caches the last logon credentials for users...
V-254450 Medium Requests sent on the secure channel are authenticated, and sensitive informat...
V-205821 Medium Requests sent on the secure channel are authenticated, and sensitive informat...
V-254451 Medium Requests sent on the secure channel are authenticated, and sensitive informat...
V-205822 Medium Requests sent on the secure channel are authenticated, and sensitive informat...
V-254452 Medium Requests sent on the secure channel are authenticated, and sensitive informat...
V-205823 Medium Requests sent on the secure channel are authenticated, and sensitive informat...
V-254345 Medium Registry entries for group policy settings can potentially be changed from th...
V-205866 Medium Registry entries for group policy settings can potentially be changed from th...
V-253373 Medium Enabling this setting and then selecting the "Process even if the Group ...
V-220814 Medium Enabling this setting and then selecting the "Process even if the Group ...
V-254340 Medium Additional security requirements are applied to UNC paths specified in harden...
V-205862 Medium Additional security requirements are applied to UNC paths specified in harden...
V-253362 Medium Additional security requirements are applied to Universal Naming Convention (...
V-250319 Medium Additional security requirements are applied to Universal Naming Convention (...
V-254430 Medium The username is one part of logon credentials that could be used to gain acce...
V-205696 Medium The username is one part of logon credentials that could be used to gain acce...
V-253379 Medium The username is one part of logon credentials that could be used to gain acce...
V-220820 Medium The username is one part of logon credentials that could be used to gain acce...
V-254454 Medium Computer account passwords are changed automatically on a regular basis. This...
V-205911 Medium Computer account passwords are changed automatically on a regular basis. This...
V-253442 Low Computer account passwords are changed automatically on a regular basis. This...
V-220918 Low Computer account passwords are changed automatically on a regular basis. This...
V-254476 Medium This setting controls the signing requirements for LDAP clients. This must be...
V-205920 Medium This setting controls the signing requirements for LDAP clients. This must be...
V-253463 Medium This setting controls the signing requirements for LDAP clients. This setting...
V-220939 Medium This setting controls the signing requirements for LDAP clients. This setting...
V-253284 High Attackers are constantly looking for vulnerabilities in systems and applicati...
V-220727 High Attackers are constantly looking for vulnerabilities in systems and applicati...
V-254364 Medium The shell protocol will limit the set of folders that applications can open w...
V-205872 Medium The shell protocol will limit the set of folders that applications can open w...
V-253398 Medium The shell protocol will limit the set of folders applications can open when r...
V-220839 Medium The shell protocol will limit the set of folders applications can open when r...
V-254248 Medium Malicious software can establish a base on individual desktops and servers. E...
V-205850 High Malicious software can establish a base on individual desktops and servers. E...
V-253264 High Malicious software can establish a base on individual desktops and servers. E...
V-220707 High Malicious software can establish a base on individual desktops and servers. E...
V-254346 Medium Some features may communicate with the vendor, sending system information or ...
V-205688 Medium Some features may communicate with the vendor, sending system information or ...
V-253374 Medium Some features may communicate with the vendor, sending system information or ...
V-220815 Medium Some features may communicate with the vendor, sending system information or ...
V-254344 Medium Compromised boot drivers can introduce malware prior to protection mechanisms...
V-205865 Medium Compromised boot drivers can introduce malware prior to protection mechanisms...
V-253372 Medium The default behavior is for Early Launch Antimalware - Boot-Start Driver Init...
V-220813 Medium By being launched first by the kernel, ELAM ( Early Launch Antimalware) is en...
V-253275 High IIS is not installed by default. Installation of Internet Information System ...
V-220718 High Installation of Internet Information System (IIS) may allow unauthorized inte...
V-254456 Medium Unattended systems are susceptible to unauthorized use and must be locked whe...
V-205633 Medium Unattended systems are susceptible to unauthorized use and should be locked w...
V-253444 Medium Unattended systems are susceptible to unauthorized use and must be locked whe...
V-220920 Medium Unattended systems are susceptible to unauthorized use and should be locked w...
V-254347 Medium Some features may communicate with the vendor, sending system information or ...
V-205689 Medium Some features may communicate with the vendor, sending system information or ...
V-253376 Medium Some features may communicate with the vendor, sending system information or ...
V-220817 Medium Some features may communicate with the vendor, sending system information or ...
V-253382 High Remote assistance allows another user to view or take control of the local se...
V-220823 High Remote assistance allows another user to view or take control of the local se...
V-253395 Medium Microsoft Defender SmartScreen helps protect systems from programs downloaded...
V-220836 Medium Windows Defender SmartScreen helps protect systems from programs downloaded f...
V-254361 Medium Microsoft Defender antivirus SmartScreen helps protect systems from programs ...
V-205692 Medium Windows Defender SmartScreen helps protect systems from programs downloaded f...
V-254333 Medium Slide shows that are displayed on the lock screen could display sensitive inf...
V-205686 Medium Slide shows that are displayed on the lock screen could display sensitive inf...
V-254265 Medium A firewall provides a line of defense against attack, allowing or blocking in...
V-253281 Medium A firewall provides a line of defense against attack, allowing or blocking in...
V-220724 Medium A firewall provides a line of defense against attack, allowing or blocking in...
V-214936 Medium A firewall provides a line of defense against attack, allowing or blocking in...
V-254371 Medium Basic authentication uses plain-text passwords that could be used to compromi...
V-205693 Medium Basic authentication uses plain-text passwords that could be used to compromi...
V-253408 Medium Basic authentication uses plain text passwords that could be used to compromi...
V-220854 Medium Basic authentication uses plain text passwords that could be used to compromi...
V-223079 Medium This policy setting allows you to manage whether Internet Explorer checks for...
V-223077 Medium This policy setting determines whether Internet Explorer 11 uses 64-bit proce...
V-254348 Medium Enabling interaction with the network selection UI allows users to change con...
V-205690 Medium Enabling interaction with the network selection UI allows users to change con...
V-253378 Medium Enabling interaction with the network selection UI allows users to change con...
V-220819 Medium Enabling interaction with the network selection UI allows users to change con...
V-254370 Medium Attachments from RSS feeds may not be secure. This setting will prevent attac...
V-205873 Medium Attachments from RSS feeds may not be secure. This setting will prevent attac...
V-253407 Medium Attachments from RSS feeds may not be secure. This setting will prevent attac...
V-220853 Medium Attachments from RSS feeds may not be secure. This setting will prevent attac...
V-254457 Medium Failure to display the logon banner prior to a logon attempt will negate lega...
V-253445 Medium Failure to display the logon banner prior to a logon attempt will negate lega...
V-205631 Medium Failure to display the logon banner prior to a logon attempt will negate lega...
V-220921 Medium Failure to display the logon banner prior to a logon attempt will negate lega...
V-220844 Medium The Windows Defender SmartScreen filter in Microsoft Edge provides warning me...
V-220841 Medium The Windows Defender SmartScreen filter in Microsoft Edge provides warning me...
V-220840 Medium The Windows Defender SmartScreen filter in Microsoft Edge provides warning me...
V-254466 High Anonymous enumeration of SAM accounts allows anonymous logon users (null sess...
V-205914 High Anonymous enumeration of SAM accounts allows anonymous logon users (null sess...
V-253453 High Anonymous enumeration of SAM accounts allows anonymous log on users (null ses...
V-220929 High Anonymous enumeration of SAM accounts allows anonymous log on users (null ses...
V-254467 High Allowing anonymous logon users (null session connections) to list all account...
V-205724 High Allowing anonymous logon users (null session connections) to list all account...
V-253454 High Allowing anonymous logon users (null session connections) to list all account...
V-220930 High Allowing anonymous logon users (null session connections) to list all account...
V-254339 Medium Insecure guest logons allow unauthenticated access to shared folders. Shared ...
V-205861 Medium Insecure guest logons allow unauthenticated access to shared folders. Shared ...
V-253360 Medium Insecure guest logons allow unauthenticated access to shared folders. Shared ...
V-220802 Medium Insecure guest logons allow unauthenticated access to shared folders. Shared ...
V-254473 Medium Certain encryption types are no longer considered secure. The DES and RC4 enc...
V-205708 Medium Certain encryption types are no longer considered secure. The DES and RC4 enc...
V-253460 Medium Certain encryption types are no longer considered secure. This setting config...
V-220936 Medium Certain encryption types are no longer considered secure. This setting config...
V-254460 Medium The server message block (SMB) protocol provides the basis for many network o...
V-205825 Medium The server message block (SMB) protocol provides the basis for many network o...
V-254475 High The Kerberos v5 authentication protocol is the default for authentication of ...
V-205919 High The Kerberos v5 authentication protocol is the default for authentication of ...
V-253462 High The Kerberos v5 authentication protocol is the default for authentication of ...
V-220938 High The Kerberos v5 authentication protocol is the default for authentication of ...
V-254461 Medium The server message block (SMB) protocol provides the basis for many network o...
V-205826 Medium The server message block (SMB) protocol provides the basis for many network o...
V-254463 Medium The server message block (SMB) protocol provides the basis for many network o...
V-205827 Medium The server message block (SMB) protocol provides the basis for many network o...
V-254464 Medium The server message block (SMB) protocol provides the basis for many network o...
V-205828 Medium The server message block (SMB) protocol provides the basis for many network o...
V-254468 Medium Access by anonymous users must be restricted. If this setting is enabled, ano...
V-205915 Medium Access by anonymous users must be restricted. If this setting is enabled, ano...
V-253455 Medium Access by anonymous users must be restricted. If this setting is enabled, the...
V-220937 High The LAN Manager hash uses a weak encryption algorithm and there are several t...
V-254277 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
V-205684 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
V-253288 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
V-220731 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
V-254276 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
V-205683 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
V-253287 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
V-220730 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
V-254471 Medium NTLM sessions that are allowed to fall back to Null (unauthenticated) session...
V-205917 Medium NTLM sessions that are allowed to fall back to Null (unauthenticated) session...
V-253458 Medium NTLM sessions that are allowed to fall back to Null (unauthenticated) session...
V-220934 Medium NTLM sessions that are allowed to fall back to Null (unauthenticated) session...
V-254469 High Allowing anonymous access to named pipes or shares provides the potential for...
V-205725 High Allowing anonymous access to named pipes or shares provides the potential for...
V-253456 High Allowing anonymous access to named pipes or shares provides the potential for...
V-220932 High Allowing anonymous access to named pipes or shares provides the potential for...
V-254433 Medium The Windows SAM stores users' passwords. Restricting Remote Procedure Call (R...
V-205747 Medium The Windows SAM stores users' passwords. Restricting Remote Procedure Call (R...
V-253457 Medium The Windows SAM stores users' passwords. Restricting remote rpc connections t...
V-220933 Medium The Windows SAM stores users' passwords. Restricting remote rpc connections t...
V-254470 Medium Services using Local System that use Negotiate when reverting to NTLM authent...
V-205916 Medium Services using Local System that use Negotiate when reverting to NTLM authent...
V-254477 Medium Microsoft has implemented a variety of security support providers for use wit...
V-205921 Medium Microsoft has implemented a variety of security support providers for use wit...
V-254478 Medium Microsoft has implemented a variety of security support providers for use wit...
V-205922 Medium Microsoft has implemented a variety of security support providers for use wit...
V-254462 Medium Some non-Microsoft SMB servers only support unencrypted (plain-text) password...
V-205655 Medium Some non-Microsoft SMB servers only support unencrypted (plain-text) password...
V-253450 Medium Some non-Microsoft SMB servers only support unencrypted (plain text) password...
V-220926 Medium Some non-Microsoft SMB servers only support unencrypted (plain text) password...
V-254275 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
V-205682 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is...
V-254335 Low Configuring the system to disable IPv6 source routing protects against spoofing.
V-205858 Low Configuring the system to disable IPv6 source routing protects against spoofing.
V-253353 Medium Configuring the system to disable IPv6 source routing protects against spoofing.
V-220795 Medium Configuring the system to disable IPv6 source routing protects against spoofing.
V-254272 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-205680 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-253277 Medium "Simple TCP/IP Services" is not installed by default. Some protocols and serv...
V-220720 Medium Some protocols and services do not support required security features, such a...
V-254336 Low Configuring the system to disable IP source routing protects against spoofing.
V-205859 Low Configuring the system to disable IP source routing protects against spoofing.
V-254288 Medium A system is more vulnerable to unauthorized access when system users recycle ...
V-205660 Medium A system is more vulnerable to unauthorized access when system users recycle ...
V-253300 Medium A system is more vulnerable to unauthorized access when system users recycle ...
V-220742 Medium A system is more vulnerable to unauthorized access when system users recycle ...
V-254258 Medium Passwords that do not expire or are reused increase the exposure of a passwor...
V-205658 Medium Passwords that do not expire or are reused increase the exposure of a passwor...
V-253273 Medium Passwords that do not expire increase exposure with a greater probability of ...
V-220716 Medium Passwords that do not expire increase exposure with a greater probability of ...
V-254474 High The LAN Manager hash uses a weak encryption algorithm and there are several t...
V-205654 High The LAN Manager hash uses a weak encryption algorithm and there are several t...
V-253461 High The LAN Manager hash uses a weak encryption algorithm and there are several t...
V-254377 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-205639 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-253414 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-220860 Medium Maintaining an audit trail of system activity logs can help identify configur...
V-254278 Medium Windows PowerShell 5.x added advanced logging features that can provide addit...
V-205685 Medium Windows PowerShell 5.x added advanced logging features that can provide addit...
V-253285 Medium Windows PowerShell 5.0 added advanced logging features which can provide addi...
V-220728 Medium Windows PowerShell 5.0 added advanced logging features which can provide addi...
V-205869 Medium Some features may communicate with the vendor, sending system information or ...
V-253393 Medium Some features may communicate with the vendor, sending system information or ...
V-220834 Medium Some features may communicate with the vendor, sending system information or ...
V-254367 Medium This setting controls the ability of users to supply passwords automatically ...
V-205809 Medium This setting controls the ability of users to supply passwords automatically ...
V-253404 Medium This setting controls the ability of users to supply passwords automatically ...
V-220850 Medium This setting controls the ability of users to supply passwords automatically ...
V-254369 Medium Remote connections must be encrypted to prevent interception of data or sensi...
V-205637 Medium Remote connections must be encrypted to prevent interception of data or sensi...
V-253406 Medium Remote connections must be encrypted to prevent interception of data or sensi...
V-220852 Medium Remote connections must be encrypted to prevent interception of data or sensi...
V-260469 High A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, ...
V-260470 High To mitigate the risk of unauthorized access to sensitive information by ent...
V-260471 Medium If auditing is enabled late in the startup process, the actions of some sta...
V-260472 Low Restricting access to the kernel message buffer limits access only to root....
V-260473 Medium Kernel core dumps may contain the full contents of system memory at the tim...
V-260474 Medium Some adversaries launch attacks with the intent of executing code in nonexe...
V-260475 Medium Some adversaries launch attacks with the intent of executing code in nonexe...
V-260476 Low Changes to any software components can have significant effects on the over...
V-260477 Medium Previous versions of software components that are not removed from the info...
V-260478 Medium Use of a complex password helps to increase the time and resources required...
V-260479 Low Inaccurate time stamps make it more difficult to correlate events and can l...
V-260480 Low Inaccurate time stamps make it more difficult to correlate events and can l...
V-260481 Low Inaccurate time stamps make it more difficult to correlate events and can l...
V-260482 High It is detrimental for operating systems to provide, or install by default, ...
V-260483 High It is detrimental for operating systems to provide, or install by default, ...
V-260484 Medium Operating systems handling data requiring "data at rest" protections must e...
V-260485 Medium Protecting audit information also includes identifying and protecting the t...
V-260486 Medium If Ubuntu 22.04 LTS were to allow any user to make changes to software libr...
V-260487 Medium If the operating system were to allow any user to make changes to software ...
V-260488 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260489 Medium Any operating system providing too much information in error messages risks...
V-260490 Medium Any operating system providing too much information in error messages risks...
V-260491 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260492 Medium Protecting audit information also includes identifying and protecting the t...
V-260493 Medium Protecting audit information also includes identifying and protecting the t...
V-260494 Medium Protecting audit information also includes identifying and protecting the t...
V-260495 Medium If Ubuntu 22.04 LTS were to allow any user to make changes to software libr...
V-260496 Medium If Ubuntu 22.04 LTS were to allow any user to make changes to software libr...
V-260497 Medium If the operating system were to allow any user to make changes to software ...
V-260498 Medium If the operating system were to allow any user to make changes to software ...
V-260499 Medium If the operating system were to allow any user to make changes to software ...
V-260500 Medium If the operating system were to allow any user to make changes to software ...
V-260501 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260502 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260503 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260504 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260505 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260506 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260507 Medium Protecting audit information also includes identifying and protecting the t...
V-260508 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260509 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260510 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260511 Medium Only authorized personnel should be aware of errors and the details of the ...
V-260512 Medium Any operating system providing too much information in error messages risks...
V-260513 Medium Preventing unauthorized information transfers mitigates the risk of informa...
V-260514 Medium Remote access services, such as those providing remote access to network de...
V-260515 Medium Remote access services, such as those providing remote access to network de...
V-260516 Medium Firewalls protect computers from network attacks by blocking or limiting ac...
V-260517 Medium Denial of service (DoS) is a condition when a resource is not available for...
V-260518 Medium To prevent unauthorized connection of devices, unauthorized transfer of inf...
V-260519 Low Inaccurate time stamps make it more difficult to correlate events and can l...
V-260520 Low Inaccurate time stamps make it more difficult to correlate events and can l...
V-260521 Low If time stamps are not consistently applied and there is no common time ref...
V-260522 Medium DoS is a condition when a resource is not available for legitimate users. W...
V-260523 High Without protection of the transmitted information, confidentiality and inte...
V-260524 High Without protection of the transmitted information, confidentiality and inte...
V-260533 Medium Without cryptographic integrity protections provided by FIPS-validated cryp...
V-260534 Medium Nonlocal maintenance and diagnostic activities are those activities conduct...
V-260537 Medium A session lock is a temporary action taken when a user stops work and moves...
V-260538 Medium A session lock is a temporary action taken when a user stops work and moves...
V-260539 High A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, ...
V-260540 Medium Without authenticating devices, unidentified or unknown devices may be intr...
V-260541 Medium Without protection of communications with wireless peripherals, confidentia...
V-260542 Medium To ensure individual accountability and prevent unauthorized access, organi...
V-260543 Medium To ensure accountability and prevent unauthenticated access, organizational...
V-260545 Medium Enforcing a minimum password lifetime helps to prevent repeated password ch...
V-260546 Medium Any password, no matter how complex, can eventually be cracked. Therefore, ...
V-260547 Medium Inactive identifiers pose a risk to systems and applications because attack...
V-260535 Medium Display of a standardized and approved use notification before granting acc...
V-260548 Medium Temporary accounts are privileged or nonprivileged accounts established dur...
V-260549 Low By limiting the number of failed logon attempts, the risk of unauthorized s...
V-260550 Low Limiting the number of logon attempts over a certain time interval reduces ...
V-260552 Low Ubuntu 22.04 LTS management includes the ability to control the number of u...
V-260553 Medium A session lock is a temporary action taken when a user stops work and moves...
V-260554 Medium Terminating an idle interactive command shell user session within a short t...
V-260535 Medium Display of a standardized and approved use notification before granting acc...
V-260536 Medium Display of a standardized and approved use notification before granting acc...
V-260555 Medium Setting the most restrictive default permissions ensures newly created acco...
V-260556 Medium Control of program execution is a mechanism used to prevent execution of un...
V-260557 Medium Control of program execution is a mechanism used to prevent execution of un...
V-260558 Medium Without reauthentication, users may access resources or perform tasks for w...
V-260559 High An isolation boundary provides access control and protects the integrity of...
V-260560 Medium Use of a complex password helps to increase the time and resources required...
V-260561 Medium Use of a complex password helps to increase the time and resources required...
V-260562 Medium Use of a complex password helps to increase the time and resources required...
V-260563 Medium Use of a complex password helps to increase the time and resources required...
V-260564 Medium If Ubuntu 22.04 LTS allows the user to select passwords based on dictionary...
V-260565 Medium The shorter the password, the lower the number of possible combinations tha...
V-260566 Medium If the operating system allows the user to consecutively reuse extensive po...
V-260567 Medium Use of a complex password helps to increase the time and resources required...
V-260569 Medium Password complexity, or strength, is a measure of the effectiveness of a pa...
V-260570 High If an account has an empty password, anyone could log on and run commands w...
V-260571 High If an account has an empty password, anyone could log on and run commands w...
V-260572 Medium Passwords need to be protected at all times, and encryption is the standard...
V-260573 Medium Using an authentication device, such as a CAC or token separate from the in...
V-260574 Medium The use of PIV credentials facilitates standardization and reduces the risk...
V-260575 Medium Without the use of multifactor authentication, the ease of access to privil...
V-260576 Medium The use of PIV credentials facilitates standardization and reduces the risk...
V-260577 Medium Without path validation, an informed trust decision by the relying party ca...
V-260578 Medium Without configuring a local cache of revocation data, there is the potentia...
V-260579 High Without mapping the certificate used to authenticate to the user account, t...
V-260580 Medium Untrusted certificate authorities (CA) can issue certificates, but they may...
V-260581 Low If cached authentication information is out-of-date, the validity of the au...
V-260582 Medium Without verification of the security functions, security functions may not ...
V-260583 Medium Without verification of the security functions, security functions may not ...
V-260584 Medium Unauthorized changes to the baseline configuration could make the system vu...
V-260585 Medium Without verification of the security functions, security functions may not ...
V-260586 Medium Protecting the integrity of the tools used for auditing purposes is a criti...
V-260587 Low Information stored in one location is vulnerable to accidental or incidenta...
V-260588 Medium Failure to a known state can address safety or security in accordance with ...
V-260589 Medium Remote access services, such as those providing remote access to network de...
V-260590 Medium Without establishing the when, where, type, source, and outcome of events t...
V-260591 Medium Without establishing the when, where, type, source, and outcome of events t...
V-260592 Low Information stored in one location is vulnerable to accidental or incidenta...
V-260593 Low It is critical for the appropriate personnel to be aware if a system is at ...
V-260594 Medium It is critical that when the operating system is at risk of failing to proc...
V-260595 Low To ensure operating systems have a sufficient storage capacity in which to ...
V-260596 Low If security personnel are not notified immediately when storage volume reac...
V-260597 Medium Unauthorized disclosure of audit records can reveal system and configuratio...
V-260598 Medium Unauthorized disclosure of audit records can reveal system and configuratio...
V-260599 Medium Unauthorized disclosure of audit records can reveal system and configuratio...
V-260600 Medium If audit information were to become compromised, then forensic analysis and...
V-260601 Medium Without the capability to restrict which roles and individuals can select w...
V-260602 Medium Without the capability to restrict which roles and individuals can select w...
V-260603 Medium Without the capability to restrict which roles and individuals can select w...
V-260604 Medium Without generating audit records specific to the security and mission needs...
V-260605 Medium Without generating audit records that are specific to the security and miss...
V-260606 Medium Without generating audit records that are specific to the security and miss...
V-260607 Medium Without generating audit records that are specific to the security and miss...
V-260608 Medium Without generating audit records that are specific to the security and miss...
V-260609 Medium Without generating audit records that are specific to the security and miss...
V-260610 Medium Without generating audit records that are specific to the security and miss...
V-260611 Medium Without generating audit records that are specific to the security and miss...
V-260612 Medium Without generating audit records that are specific to the security and miss...
V-260613 Medium Without generating audit records that are specific to the security and miss...
V-260613 Medium Without generating audit records that are specific to the security and miss...
V-260614 Medium Without generating audit records that are specific to the security and miss...
V-260615 Medium Without generating audit records that are specific to the security and miss...
V-260616 Medium Without generating audit records that are specific to the security and miss...
V-260617 Medium Without generating audit records that are specific to the security and miss...
V-260618 Medium Without generating audit records that are specific to the security and miss...
V-260619 Medium Without generating audit records that are specific to the security and miss...
V-260620 Medium Without generating audit records that are specific to the security and miss...
V-260621 Medium Without generating audit records that are specific to the security and miss...
V-260622 Medium Without generating audit records that are specific to the security and miss...
V-260623 Medium Without generating audit records that are specific to the security and miss...
V-260624 Medium Without generating audit records that are specific to the security and miss...
V-260625 Medium Without generating audit records that are specific to the security and miss...
V-260626 Medium Without generating audit records that are specific to the security and miss...
V-260627 Medium Without generating audit records that are specific to the security and miss...
V-260628 Medium Once an attacker establishes access to a system, the attacker often attempt...
V-260629 Medium Once an attacker establishes access to a system, the attacker often attempt...
V-260630 Medium Once an attacker establishes access to a system, the attacker often attempt...
V-260631 Medium Once an attacker establishes access to a system, the attacker often attempt...
V-260632 Medium Once an attacker establishes access to a system, the attacker often attempt...
V-260633 Medium Without generating audit records specific to the security and mission needs...
V-260634 Medium Without generating audit records specific to the security and mission needs...
V-260635 Medium Without generating audit records specific to the security and mission needs...
V-260636 Medium Without generating audit records specific to the security and mission needs...
V-260637 Medium Without generating audit records that are specific to the security and miss...
V-260638 Medium Without generating audit records specific to the security and mission needs...
V-260639 Medium Without generating audit records specific to the security and mission needs...
V-260640 Medium Once an attacker establishes access to a system, the attacker often attempt...
V-260641 Medium Without generating audit records specific to the security and mission needs...
V-260642 Medium Without generating audit records specific to the security and mission needs...
V-260643 Medium Without generating audit records specific to the security and mission needs...
V-260644 Medium Without generating audit records specific to the security and mission needs...
V-260645 Medium Without generating audit records specific to the security and mission needs...
V-260646 Medium Without generating audit records specific to the security and mission needs...
V-260647 Medium Without generating audit records specific to the security and mission needs...
V-260648 Medium In certain situations, software applications/programs need to execute with ...
V-260649 Medium If events associated with nonlocal administrative access or diagnostic sess...
V-260650 High Use of weak or untested encryption algorithms undermines the purposes of ut...
V-224819 High Using a privileged account to perform routine functions makes the computer ...
V-254365 Medium Saving passwords in the Remote Desktop Client could allow an unauthorized use...
V-205808 Medium Saving passwords in the Remote Desktop Client could allow an unauthorized use...
V-253402 Medium Saving passwords in the Remote Desktop Client could allow an unauthorized use...
V-220848 Medium Saving passwords in the Remote Desktop Client could allow an unauthorized use...
V-254366 Medium Preventing users from sharing the local drives on their client computers with...
V-205722 Medium Preventing users from sharing the local drives on their client computers with...
V-224820 Medium The longer a password is in use, the greater the opportunity for someone to...
V-224821 High Using applications that access the Internet or have potential Internet sour...
V-224822 Medium Backup Operators are able to read and write to any file in the system, rega...
V-224823 Medium Application/service account passwords must be of sufficient length to preve...
V-224824 Medium Setting application account passwords to expire may cause applications to s...
V-224825 Medium Shared accounts (accounts where two or more people log on with the same use...
V-224826 Medium Using an allowlist provides a configuration management method to allow the ...
V-224827 Medium Credential Guard uses virtualization-based security to protect data that co...
V-224828 High Systems at unsupported servicing levels will not receive security updates f...
V-224829 High Malicious software can establish a base on individual desktops and servers....
V-224830 Medium A properly configured Host-based Intrusion Detection System (HIDS) or Host-...
V-224831 High The ability to set access permissions and auditing is critical to maintaini...
V-224832 Medium Changing the system's file and directory permissions allows the possibility...
V-224833 Medium Changing the system's file and directory permissions allows the possibility...
V-224834 Medium Changing the system's file and directory permissions allows the possibility...
V-224835 Medium The registry is integral to the function, security, and stability of the Wi...
V-224836 Low Windows shares are a means by which files, folders, printers, and other res...
V-224837 Medium Outdated or unused accounts provide penetration points that may go undetect...
V-224838 Medium The lack of password protection enables anyone to gain access to the inform...
V-224839 Medium Passwords that do not expire or are reused increase the exposure of a passw...
V-224840 Medium Monitoring system files for changes against a baseline on a regular basis m...
V-224841 Medium Shares on a system provide network access. To prevent exposing sensitive in...
V-254368 Medium Allowing unsecure RPC communication exposes the system to man-in-the-middle a...
V-205636 Medium Allowing unsecure RPC communication exposes the system to man-in-the-middle a...
V-254431 Medium Unauthenticated RPC clients may allow anonymous access to sensitive informati...
V-205814 Medium Unauthenticated RPC clients may allow anonymous access to sensitive informati...
V-253383 Medium Configuring RPC to restrict unauthenticated RPC clients from connecting to th...
V-220824 Medium Configuring RPC to restrict unauthenticated RPC clients from connecting to th...
V-254379 Medium Unencrypted remote access to a system can allow sensitive information to be c...
V-205816 Medium Unencrypted remote access to a system can allow sensitive information to be c...
V-253417 Medium Unencrypted remote access to a system can allow sensitive information to be c...
V-220863 Medium Unencrypted remote access to a system can allow sensitive information to be c...
V-224842 Medium Use of software certificates and their accompanying installation files for ...
V-224843 High This requirement addresses protection of user-generated data as well as ope...
V-224844 Medium Information can be either unintentionally or maliciously disclosed or modif...
V-224845 Medium Unnecessary roles and features increase the attack surface of a system. Lim...
V-224846 Medium A firewall provides a line of defense against attack, allowing or blocking ...
V-224847 Medium Without the use of automated mechanisms to scan for security flaws on a con...
V-224848 Medium If temporary user accounts remain active when no longer needed or for an ex...
V-224849 Medium Emergency administrator accounts are privileged accounts established in res...
V-224850 Medium Unnecessary services increase the attack surface of a system. Some of these...
V-224851 Medium Unnecessary services increase the attack surface of a system. Some of these...
V-224852 Medium Unnecessary services increase the attack surface of a system. Some of these...
V-224853 Medium Unnecessary services increase the attack surface of a system. Some of these...
V-224854 Medium Unnecessary services increase the attack surface of a system. Some of these...
V-224855 Medium Unnecessary services increase the attack surface of a system. Some of these...
V-224856 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 ...
V-224857 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 ...
V-224858 Medium SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 ...
V-224859 Medium Windows PowerShell 5.0 added advanced logging features that can provide add...
V-224860 Medium The FTP service allows remote users to access shared files and directories....
V-224861 Medium The FTP service allows remote users to access shared files and directories ...
V-224862 Low The Windows Time Service controls time synchronization settings. Time synch...
V-224863 Medium Accounts or groups given rights on a system may show up as unresolved SIDs ...
V-224864 Low Secure Boot is a standard that ensures systems boot only to a trusted opera...
V-224865 Low UEFI provides additional security features in comparison to legacy BIOS fir...
V-224866 Medium The account lockout feature, when enabled, prevents brute-force password at...
V-254378 High Basic authentication uses plain-text passwords that could be used to compro...
V-205711 High Basic authentication uses plain-text passwords that could be used to compro...
V-253416 High Basic authentication uses plain text passwords that could be used to compromi...
V-220862 High Basic authentication uses plain text passwords that could be used to compromi...
V-254380 Medium Digest authentication is not as strong as other options and may be subject to...
V-205712 Medium Digest authentication is not as strong as other options and may be subject to...
V-253421 Medium Digest authentication is not as strong as other options and may be subject to...
V-220868 Medium Digest authentication is not as strong as other options and may be subject to...
V-254381 High Basic authentication uses plain-text passwords that could be used to compromi...
V-205713 High Basic authentication uses plain-text passwords that could be used to compromi...
V-253418 High Basic authentication uses plain text passwords that could be used to compromi...
V-220865 High Basic authentication uses plain text passwords that could be used to compromi...
V-253426 Medium Kernel DMA Protection to protect PCs against drive-by Direct Memory Access (D...
V-220902 Medium Kernel DMA Protection to protect PCs against drive-by Direct Memory Access (D...
V-224867 Medium The account lockout feature, when enabled, prevents brute-force password at...
V-224868 Medium The account lockout feature, when enabled, prevents brute-force password at...
V-224869 Medium A system is more vulnerable to unauthorized access when system users recycl...
V-224870 Medium The longer a password is in use, the greater the opportunity for someone to...
V-224871 Medium Permitting passwords to be changed in immediate succession within the same ...
V-224872 Medium Information systems not protected with strong password schemes (including p...
V-224873 Medium The use of complex passwords increases their strength against attack. The b...
V-224874 High Storing passwords using reversible encryption is essentially the same as st...
V-224875 Medium Protection of log data includes assuring the log data is not accidentally l...
V-224876 Medium Protection of log data includes ensuring the log data is not accidentally l...
V-224877 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224878 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224879 Medium Maintaining an audit trail of system activity logs can help identify config...
V-218822 Medium Vulnerability Discussion TLS is a required transmission protocol for a web s...
V-218821 Medium TLS encryption is a required security setting for a private web server. Encry...
V-254263 Medium Information can be either unintentionally or maliciously disclosed or modifie...
V-205829 Medium Information can be either unintentionally or maliciously disclosed or modifie...
V-254343 Medium Virtualization Based Security (VBS) provides the platform for the additional ...
V-205864 Medium Virtualization-based security (VBS) provides the platform for the additional ...
V-253369 Medium Virtualization-based Security (VBS) provides the platform for the additional ...
V-220811 Medium Virtualization Based Security (VBS) provides the platform for the additional ...
V-254374 High Standard user accounts must not be granted elevated privileges. Enabling Wind...
V-205802 High Standard user accounts must not be granted elevated privileges. Enabling Wind...
V-253411 High Standard user accounts must not be granted elevated privileges. Enabling Wind...
V-220857 High Standard user accounts must not be granted elevated privileges. Enabling Wind...
V-224880 Medium Protecting audit information also includes identifying and protecting the t...
V-224881 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224882 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224883 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224884 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224885 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224886 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224887 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224888 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224890 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224891 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224892 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224893 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224894 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224895 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224896 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224897 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224898 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224899 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224900 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224901 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224902 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224903 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224904 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224905 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224906 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224907 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224908 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224909 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224910 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224911 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224912 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224913 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224914 Medium Slide shows that are displayed on the lock screen could display sensitive i...
V-224915 Medium When the WDigest Authentication protocol is enabled, plain-text passwords a...
V-224916 Low Configuring the system to disable IPv6 source routing protects against spoo...
V-224917 Low Configuring the system to disable IP source routing protects against spoofing.
V-224918 Low Allowing ICMP redirect of routes can lead to traffic not being routed prope...
V-224919 Low Configuring the system to ignore name release requests, except from WINS se...
V-224920 Medium Insecure guest logons allow unauthenticated access to shared folders. Share...
V-224921 Medium Additional security requirements are applied to Universal Naming Convention...
V-224922 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224923 Medium Virtualization-based security (VBS) provides the platform for the additiona...
V-224924 Medium Compromised boot drivers can introduce malware prior to protection mechanis...
V-224925 Medium Registry entries for group policy settings can potentially be changed from ...
V-224926 Medium Some features may communicate with the vendor, sending system information o...
V-224927 Medium Some features may communicate with the vendor, sending system information o...
V-224928 Medium Enabling interaction with the network selection UI allows users to change c...
V-224929 Medium A system that does not require authentication when resuming from sleep may ...
V-224930 Medium A system that does not require authentication when resuming from sleep may ...
V-224931 Low Some features may communicate with the vendor, sending system information o...
V-224932 High Allowing AutoPlay to execute may introduce malicious code to a system. Auto...
V-224933 High Allowing AutoRun commands to execute may introduce malicious code to a syst...
V-224934 High Allowing AutoPlay to execute may introduce malicious code to a system. Auto...
V-224935 Medium Enumeration of administrator accounts when elevating can provide part of th...
V-224936 Medium Some features may communicate with the vendor, sending system information o...
V-224937 Medium Inadequate log size will cause the log to fill up quickly. This may prevent...
V-224938 Medium Inadequate log size will cause the log to fill up quickly. This may prevent...
V-224939 Medium Inadequate log size will cause the log to fill up quickly. This may prevent...
V-224940 Medium Windows SmartScreen helps protect systems from programs downloaded from the...
V-224941 Medium Data Execution Prevention provides additional protection by performing chec...
V-224942 Low Legacy plug-in applications may continue to function when a File Explorer s...
V-224943 Medium The shell protocol will limit the set of folders that applications can open...
V-224944 Medium Saving passwords in the Remote Desktop Client could allow an unauthorized u...
V-224945 Medium Preventing users from sharing the local drives on their client computers wi...
V-224946 Medium This setting controls the ability of users to supply passwords automaticall...
V-224947 Medium Allowing unsecure RPC communication exposes the system to man-in-the-middle...
V-224948 Medium Remote connections must be encrypted to prevent interception of data or sen...
V-224949 Medium Attachments from RSS feeds may not be secure. This setting will prevent att...
V-236000 Medium A known vulnerability in Windows could allow the execution of malicious cod...
V-224951 Medium Basic authentication uses plain-text passwords that could be used to compro...
V-224952 Medium Indexing of encrypted files may expose sensitive data. This setting prevent...
V-224953 Medium Installation options for applications are typically controlled by administr...
V-224954 High Standard user accounts must not be granted elevated privileges. Enabling Wi...
V-224955 Medium Web-based programs may attempt to install malicious software on a system. E...
V-224956 Medium Windows can be configured to automatically sign the user back in after a Wi...
V-224957 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224958 High Basic authentication uses plain-text passwords that could be used to compro...
V-224959 Medium Unencrypted remote access to a system can allow sensitive information to be...
V-224960 Medium Digest authentication is not as strong as other options and may be subject ...
V-224961 High Basic authentication uses plain-text passwords that could be used to compro...
V-224962 Medium Unencrypted remote access to a system can allow sensitive information to be...
V-224963 Medium Storage of administrative credentials could allow unauthorized access. Disa...
V-257502 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224964 High An account that does not have Administrator duties must not have Administra...
V-224965 Medium This policy setting determines whether the Kerberos Key Distribution Center...
V-224966 Medium This setting determines the maximum amount of time (in minutes) that a gran...
V-224967 Medium In Kerberos, there are two types of tickets: Ticket Granting Tickets (TGTs)...
V-224968 Medium This setting determines the period of time (in days) during which a user's ...
V-224969 Medium This setting determines the maximum time difference (in minutes) that Kerbe...
V-224970 High Improper access permissions for directory data-related files could allow un...
V-224971 High Improper access permissions for directory data files could allow unauthoriz...
V-224972 High When directory service database objects do not have appropriate access cont...
V-224973 High When Active Directory objects do not have appropriate access control permis...
V-224974 High When directory service database objects do not have appropriate access cont...
V-224975 Medium When directory service data files, especially for directories used for iden...
V-224976 Medium Executing application servers on the same host machine with a directory ser...
V-224977 Medium Directory data that is not appropriately encrypted is subject to compromise...
V-224978 High To the extent that anonymous access to directory data (outside the root DSE...
V-224979 Low The failure to terminate inactive network connections increases the risk of...
V-224980 Medium When inappropriate audit settings are configured for directory service data...
V-224981 Medium When inappropriate audit settings are configured for directory service data...
V-224982 Medium When inappropriate audit settings are configured for directory service data...
V-224983 Medium When inappropriate audit settings are configured for directory service data...
V-224984 Medium When inappropriate audit settings are configured for directory service data...
V-224985 Medium When inappropriate audit settings are configured for directory service data...
V-224986 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224987 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224988 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224989 Medium Maintaining an audit trail of system activity logs can help identify config...
V-224991 Medium Domain controllers are part of the chain of trust for PKI authentications. ...
V-224992 High A PKI implementation depends on the practices established by the Certificat...
V-224993 High A PKI implementation depends on the practices established by the Certificat...
V-224994 Medium Smart cards such as the CAC support a two-factor authentication technique. ...
V-254373 Medium Installation options for applications are typically controlled by administrat...
V-205801 Medium Installation options for applications are typically controlled by administrat...
V-253410 Medium Installation options for applications are typically controlled by administrat...
V-220856 Medium Installation options for applications are typically controlled by administrat...
V-254375 Medium Web-based programs may attempt to install malicious software on a system. Ens...
V-205874 Medium Web-based programs may attempt to install malicious software on a system. Ens...
V-253412 Medium Web-based programs may attempt to install malicious software on a system. Ens...
V-220858 Medium Web-based programs may attempt to install malicious software on a system. Ens...
V-253283 High Attackers are constantly looking for vulnerabilities in systems and applicati...
V-220726 High Attackers are constantly looking for vulnerabilities in systems and applicati...
V-254362 Medium Data Execution Prevention provides additional protection by performing checks...
V-205830 Medium Data Execution Prevention provides additional protection by performing checks...
V-253396 Medium Data Execution Prevention (DEP) provides additional protection by performing ...
V-220837 Medium Data Execution Prevention (DEP) provides additional protection by performing ...
V-254442 Medium To ensure secure DoD websites and DoD-signed code are properly validated, the...
V-205648 Medium To ensure secure DoD websites and DoD-signed code are properly validated, the...
V-253427 Medium To ensure secure DoD websites and DoD-signed code are properly validated, the...
V-220903 Medium To ensure secure DoD websites and DoD-signed code are properly validated, the...
V-254269 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-205678 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-254270 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-205697 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-254271 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-205679 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-254273 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-205698 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-253278 Medium The "Telnet Client" is not installed by default. Some protocols and services ...
V-220721 Medium Some protocols and services do not support required security features, such a...
V-254274 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-205681 Medium Unnecessary services increase the attack surface of a system. Some of these s...
V-253279 Medium The "TFTP Client" is not installed by default. Some protocols and services do...
V-220722 Medium Some protocols and services do not support required security features, such a...
V-254284 Medium Secure Boot is a standard that ensures systems boot only to a trusted operati...
V-205857 Low Secure Boot is a standard that ensures systems boot only to a trusted operati...
V-253257 Medium Secure Boot is a standard that ensures systems boot only to a trusted operati...
V-220700 Low Secure Boot is a standard that ensures systems boot only to a trusted operati...
V-254357 Low Windows Update can obtain updates from additional sources instead of Microsof...
V-205870 Low Windows Update can obtain updates from additional sources instead of Microsof...
V-253394 Low Windows 11 allows Windows Update to obtain updates from additional sources in...
V-220835 Low Windows 10 allows Windows Update to obtain updates from additional sources in...
V-224995 Medium Unsigned network traffic is susceptible to man-in-the-middle attacks, where...
V-224996 Medium Enabling this setting on all domain controllers in a domain prevents domain...
V-224997 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-224998 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-224999 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225000 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225001 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225002 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225003 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-271430 High Weak mappings give rise to security vulnerabilities and demand hardening me...
V-225004 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225005 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225006 Medium The krbtgt account acts as a service account for the Kerberos Key Distribut...
V-225007 High An account that does not have Administrator duties must not have Administra...
V-225008 Medium A compromised local administrator account can provide means for an attacker...
V-225009 Medium The username is one part of logon credentials that could be used to gain ac...
V-225010 Medium Unauthenticated RPC clients may allow anonymous access to sensitive informa...
V-225011 Medium The default Windows configuration caches the last logon credentials for use...
V-225012 High Credential Guard uses virtualization-based security to protect data that co...
V-225013 Medium The Windows Security Account Manager (SAM) stores users' passwords. Restric...
V-225014 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225015 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225016 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225017 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225018 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225019 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225020 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-225021 Medium To ensure secure DoD websites and DoD-signed code are properly validated, t...
V-225022 Medium To ensure users do not experience denial of service when performing certifi...
V-225023 Medium To ensure users do not experience denial of service when performing certifi...
V-225024 Medium A system faces an increased vulnerability threat if the built-in guest acco...
V-225025 High An account without a password can allow unauthorized access to a system as ...
V-225026 Medium The built-in administrator account is a well-known account subject to attac...
V-225027 Medium The built-in guest account is a well-known user account on all Windows syst...
V-225028 Medium Maintaining an audit trail of system activity logs can help identify config...
V-225029 Medium Requests sent on the secure channel are authenticated, and sensitive inform...
V-225030 Medium Requests sent on the secure channel are authenticated, and sensitive inform...
V-225031 Medium Requests sent on the secure channel are authenticated, and sensitive inform...
V-225032 Medium Computer account passwords are changed automatically on a regular basis. Di...
V-225033 Medium Computer account passwords are changed automatically on a regular basis. Th...
V-225034 Medium A computer connecting to a domain controller will establish a secure channe...
V-225035 Medium Unattended systems are susceptible to unauthorized use and should be locked...
V-225036 Medium Failure to display the logon banner prior to a logon attempt will negate le...
V-225037 Low Failure to display the logon banner prior to a logon attempt will negate le...
V-225038 Medium Unattended systems are susceptible to unauthorized use and must be locked. ...
V-225039 Medium The server message block (SMB) protocol provides the basis for many network...
V-225040 Medium The server message block (SMB) protocol provides the basis for many network...
V-225041 Medium Some non-Microsoft SMB servers only support unencrypted (plain-text) passwo...
V-225042 Medium The server message block (SMB) protocol provides the basis for many network...
V-225043 Medium The server message block (SMB) protocol provides the basis for many network...
V-225044 High Allowing anonymous SID/Name translation can provide sensitive information f...
V-225045 High Anonymous enumeration of SAM accounts allows anonymous logon users (null se...
V-225046 High Allowing anonymous logon users (null session connections) to list all accou...
V-225047 Medium Access by anonymous users must be restricted. If this setting is enabled, a...
V-225048 High Allowing anonymous access to named pipes or shares provides the potential f...
V-225093 Medium Inappropriate granting of user rights can provide system, administrative, a...
V-254383 Medium Storage of administrative credentials could allow unauthorized access. Disall...
V-205810 Medium Storage of administrative credentials could allow unauthorized access. Disall...
V-253420 Medium Storage of administrative credentials could allow unauthorized access. Disall...
V-220867 Medium Storage of administrative credentials could allow unauthorized access. Disall...
V-254382 Medium Unencrypted remote access to a system can allow sensitive information to be c...
V-205817 Medium Unencrypted remote access to a system can allow sensitive information to be c...
V-253419 Medium Unencrypted remote access to a system can allow sensitive information to be c...
V-254238 Medium Using a privileged account to perform routine functions makes the computer vu...
V-205844 High Using a privileged account to perform routine functions makes the computer vu...
V-254239 Medium The longer a password is in use, the greater the opportunity for someone to g...
V-205657 Medium The longer a password is in use, the greater the opportunity for someone to g...
V-253476 Medium The longer a password is in use, the greater the opportunity for someone to g...
V-220952 Medium The longer a password is in use, the greater the opportunity for someone to g...
V-254240 High Using applications that access the internet or have potential internet source...
V-205845 High Using applications that access the Internet or have potential Internet source...
V-253294 High Using applications that access the internet or have potential internet source...
V-220737 High Using applications that access the Internet or have potential Internet source...
V-254241 Medium Backup Operators are able to read and write to any file in the system, regard...
V-205846 Medium Backup Operators are able to read and write to any file in the system, regard...
V-253270 Medium Backup Operators are able to read and write to any file in the system, regard...
V-220713 Medium Backup Operators are able to read and write to any file in the system, regard...
V-254242 Medium Application/service account passwords must be of sufficient length to prevent...
V-205661 Medium Application/service account passwords must be of sufficient length to prevent...
V-254243 Medium Setting application account passwords to expire may cause applications to sto...
V-205847 Medium Setting application account passwords to expire may cause applications to sto...
V-254244 Medium Shared accounts (accounts where two or more people log on with the same user ...
V-205699 Medium Shared accounts (accounts where two or more people log on with the same user ...
V-254245 Medium Using an allowlist provides a configuration management method to allow the ex...
V-205807 Medium Using an allowlist provides a configuration management method to allow the ex...
V-253262 Medium Utilizing an allowlist provides a configuration management method for allowin...
V-220705 Medium Utilizing an allowlist provides a configuration management method for allowin...
V-254246 Medium Credential Guard uses virtualization-based security to protect data that coul...
V-205848 Medium Credential Guard uses virtualization-based security to protect data that coul...
V-253255 Medium Credential Guard uses virtualization-based security to protect information th...
V-220698 Medium Credential Guard uses virtualization-based security to protect information th...
V-263646 Medium Synchronization of internal system clocks with an authoritative source provid...
V-205215 High Applications handling data requiring "data-at-rest" protections mus...
V-205214 High Applications handling data requiring "data at rest" protections mus...
V-205216 High Without protection of the transmitted information, confidentiality and integr...
V-263645 Medium Time synchronization of system clocks is essential for the correct execution ...
V-263644 Medium A Trusted Platform Module (TPM) is an example of a hardware-protected data st...
V-263643 Medium Public key infrastructure (PKI) certificates are certificates with visibility...
V-263642 Medium Nonlocal maintenance and diagnostic activities are conducted by individuals w...
V-263641 Medium Public key cryptography is a valid authentication mechanism for individuals, ...
V-263640 Medium Password-based authentication applies to passwords regardless of whether they...
V-263639 Medium Password-based authentication applies to passwords regardless of whether they...
V-263638 Medium Password-based authentication applies to passwords regardless of whether they...
V-263637 Medium Password-based authentication applies to passwords regardless of whether they...
V-263636 Medium Password-based authentication applies to passwords regardless of whether they...
V-263635 Medium Password-based authentication applies to passwords regardless of whether they...
V-263634 Medium Password-based authentication applies to passwords regardless of whether they...
V-263633 Medium Password-based authentication applies to passwords regardless of whether they...
V-263632 Medium Password-based authentication applies to passwords regardless of whether they...
V-263631 Medium The purpose of requiring a device that is separate from the system to which t...
V-263630 Medium The purpose of requiring a device that is separate from the system to which t...
V-263629 Medium Individual authentication prior to shared group authentication mitigates the ...
V-263628 Medium Software and firmware components prevented from installation unless signed wi...
V-263627 Medium Organizations log system accesses associated with applying configuration chan...
V-263626 Medium Audit information includes all information needed to successfully audit syste...
V-263625 Medium Automated mechanisms for centralized reviews and analyses include Security In...
V-263624 Medium Disabling expired, inactive, or otherwise anomalous accounts supports the con...
V-263623 Medium Disabling expired, inactive, or otherwise anomalous accounts supports the con...
V-220317 Medium In addition to network-based dispersion, authoritative name servers should be...
V-220316 Medium To enable zone transfer (requests and responses) through authenticated messag...
V-205253 Medium Configuration settings are the set of parameters that can be changed that aff...
V-205252 Medium The use of CNAME records for exercises, tests, or zone-spanning aliases shoul...
V-205251 Medium If a name server were able to claim authority for a resource record in a doma...
V-205250 Medium The private keys in the KSK and ZSK key pairs must be protected from unauthor...
V-205249 Medium The private keys in the KSK and ZSK key pairs must be protected from unauthor...
V-205248 Medium OS configuration practices as issued by the US Computer Emergency Response Te...
V-205247 Medium OS configuration practices as issued by the US Computer Emergency Response Te...
V-205246 Medium A hidden master authoritative server is an authoritative DNS server whose IP ...
V-205245 Medium Failure to provide logical access restrictions associated with changes to app...
V-205244 Medium Each newer version of the name server software, especially the BIND software,...
V-205243 Medium All caching name servers must be authoritative for the root zone because, wit...
V-205242 Medium DNS servers with an internal role only process name/address resolution reques...
V-205241 Medium Discretionary Access Control (DAC) is based on the premise that individual us...
V-205240 Medium Any DNS implementation must be designed to be able to conform to the Internet...
V-205239 Medium Authoritative name servers (especially primary name servers) should be config...
V-205238 Medium Instead of having the same set of authoritative name servers serve different ...
V-205237 Medium Instead of having the same set of authoritative name servers serve different ...
V-205236 Medium Authoritative name servers for an enterprise may be configured to receive req...
V-205235 Medium The choice of digital signature algorithm will be based on recommended algori...
V-205234 Medium The specification for a digital signature mechanism in the context of the DNS...
V-205233 Medium The only protection approach for content control of DNS zone file is the use ...
V-205232 Medium Most enterprises have an authoritative primary server and a host of authorita...
V-205231 Medium To enable zone transfer (requests and responses) through authenticated messag...
V-205230 Medium Poorly constructed NS records pose a security risk because they create condit...
V-205229 Medium To ensure that RRs associated with a query are really missing in a zone file ...
V-205228 Medium The best way for a zone administrator to minimize the impact of a key comprom...
V-205227 Medium NSEC3 RRs contain other options than just the (hashed) next name and RRType b...
V-205226 Medium Use of weak or untested encryption algorithms undermines the purposes of util...
V-205225 Medium Auditing and logging are key components of any security architecture. It is e...
V-205224 Medium Auditing and logging are key components of any security architecture. It is e...
V-205223 Medium Security function is defined as the hardware, software, and/or firmware of th...
V-205222 Medium Security function is defined as the hardware, software, and/or firmware of th...
V-205221 Medium Failing to an unsecure condition negatively impacts application security and ...
V-205220 Medium A common vulnerability of applications is unpredictable behavior when invalid...
V-205219 Medium Information can be either unintentionally or maliciously disclosed or modifie...
V-205218 Medium Information can be either unintentionally or maliciously disclosed or modifie...
V-205217 Medium Encrypting information for transmission protects information from unauthorize...
V-205213 Medium Untrusted Certificate Authorities (CA) can issue certificates, but they may b...
V-205212 Medium If data origin authentication and data integrity verification are not perform...
V-205211 Medium If data origin authentication and data integrity verification are not perform...
V-205210 Medium If data origin authentication and data integrity verification are not perform...
V-205209 Medium If data origin authentication and data integrity verification are not perform...
V-205208 Medium The major threat associated with DNS forged responses or failures is the inte...
V-205207 Medium The major threat associated with DNS forged responses or failures is the inte...
V-205206 Medium The major threat associated with DNS forged responses or failures is the inte...
V-205205 Medium Without configuring a local cache of revocation data, there is the potential ...
V-205204 Medium Without authenticating devices, unidentified or unknown devices may be introd...
V-205203 Medium Without authenticating devices, unidentified or unknown devices may be introd...
V-205201 Medium A potential vulnerability of DNS is that an attacker can poison a name server...
V-205199 Medium Failing to act on the validation errors may result in the use of invalid, cor...
V-205198 Medium Validation of the binding of the information prevents the modification of inf...
V-205197 Medium Without a means for identifying the individual that produced the information,...
V-205196 Medium Weakly bound credentials can be modified without invalidating the credential;...
V-205193 Medium Security function is defined as the hardware, software, and/or firmware of th...
V-205192 Medium Predictable failure prevention requires organizational planning to address sy...
V-205191 Medium Invalid user input occurs when a user inserts data or characters into an appl...
V-205190 Medium A DoS is a condition when a resource is not available for legitimate users. W...
V-205189 Medium A DoS is a condition where a resource is not available for legitimate users. ...
V-205188 Medium Preventing unauthorized information transfers mitigates the risk of informati...
V-205187 Medium Information at rest refers to the state of information when it is located on ...
V-205186 Medium Failure to a known state can address safety or security in accordance with th...
V-205185 Medium Failure to a known safe state helps prevent systems from failing to a state t...
V-205184 Medium The underlying feature in the major threat associated with DNS query/response...
V-205183 Medium DNS is a fundamental network service that is prone to various attacks, such a...
V-205182 Medium DNS is a fundamental network service that is prone to various attacks, such a...
V-205180 Medium If name server replies are invalid or cannot be validated, many networking fu...
V-205179 Medium A mechanism to detect and prevent unauthorized communication flow must be con...
V-205178 Medium The best way for a zone administrator to minimize the impact of a key comprom...
V-205177 Medium If name server replies are invalid or cannot be validated, many networking fu...
V-205176 Medium The underlying feature in the major threat associated with DNS query/response...
V-205175 Medium If maintenance tools are used by unauthorized personnel, they may accidentall...
V-205174 Medium Security-relevant information is any information within information systems t...
V-205173 Medium The private keys in the KSK and ZSK key pairs must be protected from unauthor...
V-205172 Medium To enable zone transfer (requests and responses) through authenticated messag...
V-205171 Medium To enable zone transfer (requests and responses) through authenticated messag...
V-205170 Medium The cornerstone of the PKI is the private key used to encrypt or digitally si...
V-205169 Medium Without identifying devices, unidentified or unknown devices may be introduce...
V-205168 Medium In order to prevent unauthorized connection of devices, unauthorized transfer...
V-205167 Medium Protection of log data includes assuring log data is not accidentally lost or...
V-205166 Medium Without information that establishes the identity of the subjects (i.e., user...
V-205165 Medium Without information about the outcome of events, security personnel cannot ma...
V-205164 Medium Without establishing the source of the event, it is impossible to establish, ...
V-205163 Medium Without establishing where events occurred, it is impossible to establish, co...
V-205162 Medium Without establishing when events occurred, it is impossible to establish, cor...
V-205161 Medium Auditing and logging are key components of any security architecture. It is e...
V-205160 Medium Without the capability to generate audit records, it would be difficult to es...
V-205159 Medium Without the capability to generate audit records, it would be difficult to es...
V-205158 Medium Limiting the number of concurrent sessions reduces the risk of Denial of Serv...
V-205157 Medium Limiting the number of concurrent sessions reduces the risk of Denial of Serv...