STIGQter STIGQter: STIG Summary: Red Hat Enterprise Linux 8 Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 23 Apr 2021:

RHEL 8 must disable the controller area network (CAN) protocol.

DISA Rule

SV-230495r627750_rule

Vulnerability Number

V-230495

Group Title

SRG-OS-000095-GPOS-00049

Rule Version

RHEL-08-040022

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Configure the operating system to disable the ability to use the CAN protocol kernel module.

Add or update the following lines in the file "/etc/modprobe.d/blacklist.conf":

install CAN /bin/true
blacklist CAN

Reboot the system for the settings to take effect.

Check Contents

Verify the operating system disables the ability to load the CAN protocol kernel module.

$ sudo grep -ri CAN /etc/modprobe.d/* | grep -i "/bin/true"

install CAN /bin/true

If the command does not return any output, or the line is commented out, and use of the CAN protocol is not documented with the Information System Security Officer (ISSO) as an operational requirement, this is a finding.

Verify the operating system disables the ability to use the CAN protocol.

Check to see if the CAN protocol is disabled with the following command:

$ sudo grep -ri CAN /etc/modprobe.d/* | grep -i "blacklist"

blacklist CAN

If the command does not return any output or the output is not "blacklist CAN", and use of the CAN protocol is not documented with the Information System Security Officer (ISSO) as an operational requirement, this is a finding.

Vulnerability Number

V-230495

Documentable

False

Rule Version

RHEL-08-040022

Severity Override Guidance

Verify the operating system disables the ability to load the CAN protocol kernel module.

$ sudo grep -ri CAN /etc/modprobe.d/* | grep -i "/bin/true"

install CAN /bin/true

If the command does not return any output, or the line is commented out, and use of the CAN protocol is not documented with the Information System Security Officer (ISSO) as an operational requirement, this is a finding.

Verify the operating system disables the ability to use the CAN protocol.

Check to see if the CAN protocol is disabled with the following command:

$ sudo grep -ri CAN /etc/modprobe.d/* | grep -i "blacklist"

blacklist CAN

If the command does not return any output or the output is not "blacklist CAN", and use of the CAN protocol is not documented with the Information System Security Officer (ISSO) as an operational requirement, this is a finding.

Check Content Reference

M

Target Key

2921

Comments