STIGQter STIGQter: STIG Summary: Juniper SRX SG NDM Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Apr 2021:

For local accounts using password authentication (i.e., the root account and the account of last resort) the Juniper SRX Services Gateway must use the SHA1 or later protocol for password authentication.

DISA Rule

SV-223223r513358_rule

Vulnerability Number

V-223223

Group Title

SRG-APP-000172-NDM-000259

Rule Version

JUSX-DM-000136

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Enter the configuration mode on the Juniper SRX, set the password option for the local user account of last resort using the following command.

[edit]
set system login password format sha1

Check Contents

Verify the default local password enforces this requirement by entering the following in configuration mode.

[edit]
show system login password

If the password format is not set to SHA-1, this is a finding.

Vulnerability Number

V-223223

Documentable

False

Rule Version

JUSX-DM-000136

Severity Override Guidance

Verify the default local password enforces this requirement by entering the following in configuration mode.

[edit]
show system login password

If the password format is not set to SHA-1, this is a finding.

Check Content Reference

M

Target Key

4098

Comments