Skip to content
ATO Pathways
Log In
Overview
Search
Catalogs
SCAP
OSCAL
Catalogs
Profiles
Documents
References
Knowledge Base
Platform Documentation
Compliance Dictionary
Platform Changelog
About
Catalogs
XCCDF
Router Security Requirements Guide
SRG-NET-000364
The perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop header with invalid option type values.
The perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop header with invalid option type values.
An XCCDF Rule
Details
Profiles
Prose
The perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop header with invalid option type values.
Medium Severity
<VulnDiscussion>These options are intended to be for the Destination Options header only. The optional and extensible natures of the IPv6 extension headers require higher scrutiny since many implementations do not always drop packets with headers that it cannot recognize and hence could cause a Denial-of-Service on the target device. In addition, the type, length, value (TLV) formatting provides the ability for headers to be very large. </VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>