RHEL-08-040022 - RHEL 8 must disable the controller area network (CAN) protocol. - blacklist

Information

It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooked and therefore may remain unsecured. They increase the risk to the platform by providing additional attack vectors.

Failing to disconnect unused protocols can result in a system compromise.

The Controller Area Network (CAN) is a serial communications protocol, which was initially developed for automotive and is now also used in marine, industrial, and medical applications. Disabling CAN protects the system against exploitation of any flaws in its implementation.

Solution

Configure the operating system to disable the ability to use the CAN protocol kernel module.

Add or update the following lines in the file '/etc/modprobe.d/blacklist.conf':

install CAN /bin/true
blacklist CAN

Reboot the system for the settings to take effect.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_8_V1R1_STIG.zip

Item Details

References: CAT|III, CCI|CCI-000381, Rule-ID|SV-230495r599732_rule, STIG-ID|RHEL-08-040022, Vuln-ID|V-230495

Plugin: Unix

Control ID: 92d8d118da303ec86f28ff1577c4e754f04267f41390dc89dd178262d24e725c