Skip to main content
CUI

STIG Rule - V-206435

V-206435

SV-206435r961632_rule

CAT II

Web server session IDs must be sent to the client using SSL/TLS.

From: Web Server Security Requirements Guide (V4R4)

Description

<VulnDiscussion>The HTTP protocol is a stateless protocol. To maintain a session, a session identifier is used. The session identifier is a piece of data that is used to identify a session and a user. If the session identifier is compromised by an attacker, the session can be hijacked. By encrypting the session identifier, the identifier becomes more difficult for an attacker to hijack, decrypt, and use before the session has expired.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

Check Procedure

Review the web server documentation and deployed configuration to determine whether the session identifier is being sent to the client encrypted. If the web server does not encrypt the session identifier, this is a finding.

Fix Text

Configure the web server to encrypt the session identifier for transmission to the client.

CCI Reference

CCI-002418
Created
2026-04-07 20:08:40
Last Updated
2026-04-07 20:08:40
CUI