Enhancement: file/audit/cisco/disable-pad-service.yaml by md
parent
32ec5f3f6b
commit
0acbfcd28e
|
@ -1,13 +1,17 @@
|
||||||
id: disable-pad-service
|
id: disable-pad-service
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Disable PAD service
|
name: Cisco PAD - Detect
|
||||||
author: pussycat0x
|
author: pussycat0x
|
||||||
severity: info
|
severity: info
|
||||||
description: |
|
description: |
|
||||||
To reduce the risk of unauthorized access, organizations should implement a security policy restricting unnecessary services such as the 'PAD' service.
|
Cisco PAD service has proven vulnerable to attackers. To reduce the risk of unauthorized access, organizations should implement a security policy restricting or disabling unnecessary access.
|
||||||
reference:
|
reference:
|
||||||
- http://www.cisco.com/en/US/docs/ios-xml/ios/wan/command/wan-s1.html#GUID-C5497B77-3FD4-4D2F-AB08-1317D5F5473B
|
- http://www.cisco.com/en/US/docs/ios-xml/ios/wan/command/wan-s1.html#GUID-C5497B77-3FD4-4D2F-AB08-1317D5F5473B
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
|
cvss-score: 0.0
|
||||||
|
cwe-id: CWE-200
|
||||||
tags: cisco,config-audit,cisco-switch,file,router
|
tags: cisco,config-audit,cisco-switch,file,router
|
||||||
|
|
||||||
file:
|
file:
|
||||||
|
@ -24,3 +28,5 @@ file:
|
||||||
- type: word
|
- type: word
|
||||||
words:
|
words:
|
||||||
- "configure terminal"
|
- "configure terminal"
|
||||||
|
|
||||||
|
# Enhanced by md on 2023/05/03
|
||||||
|
|
Loading…
Reference in New Issue