Skip to content

The Infoblox NIOS version must be at the appropriate version.

An XCCDF Rule

Description

<VulnDiscussion>Each newer version of the name server software, especially the BIND software, generally is devoid of vulnerabilities found in earlier versions because it has design changes incorporated to address those vulnerabilities. These vulnerabilities have been exploited (i.e., some form of attack was launched), and sufficient information has been generated with respect to the nature of those exploits. It makes good business sense to run the latest version of name server software because theoretically, it is the safest version. However, even if the software is the latest version, it is not safe to run it in default mode. The security administrator must always configure the software to run in the recommended secure mode of operation after becoming familiar with the new security settings for the latest version.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

ID
SV-233875r621666_rule
Severity
Medium
References
Updated



Remediation - Manual Procedure

Refer to the Infoblox NIOS Administrator Guide if necessary.  

1. Log on to the Infoblox support portal and download the current version of NIOS. 
2. Perform a Grid upgrade.