ESXI-65-000023 - The ESXi host SSH daemon must be configured to not allow X11 forwarding.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

X11 forwarding over SSH allows for the secure remote execution of X11-based applications. This feature can increase the attack surface of an SSH connection.

Solution

From an SSH session connected to the ESXi host, or from the ESXi shell, add or correct the following line in '/etc/ssh/sshd_config':

X11Forwarding no

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-5_Y21M10_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, CAT|II, CCI|CCI-000366, CSCv6|3.1, Rule-ID|SV-207624r388482_rule, STIG-ID|ESXI-65-000023, STIG-Legacy|SV-104079, STIG-Legacy|V-93993, Vuln-ID|V-207624

Plugin: Unix

Control ID: 238c2533e97ef5516150a529f6a9a754a42830339ebbeb059c4ccdad75c47395